Raspbian Package Auto-Building

Build log for nss (2:3.14.5-1+deb7u7) on armhf

nss2:3.14.5-1+deb7u7armhf → 2016-06-06 23:02:54

sbuild (Debian sbuild) 0.66.0 (04 Oct 2015) on testbuildd.raspbian.org

+==============================================================================+
| nss 2:3.14.5-1+deb7u7 (armhf)                              06 Jun 2016 22:18 |
+==============================================================================+

Package: nss
Version: 2:3.14.5-1+deb7u7
Source Version: 2:3.14.5-1+deb7u7
Distribution: wheezy-staging
Machine Architecture: armhf
Host Architecture: armhf
Build Architecture: armhf

I: NOTICE: Log filtering will replace 'build/nss-RwsTsa/nss-3.14.5' with '<<PKGBUILDDIR>>'
I: NOTICE: Log filtering will replace 'build/nss-RwsTsa' with '<<BUILDDIR>>'
I: NOTICE: Log filtering will replace 'var/lib/schroot/mount/wheezy-staging-armhf-sbuild-2e2b15e2-02f1-42d7-b114-f35698d6a6ba' with '<<CHROOT>>'

+------------------------------------------------------------------------------+
| Update chroot                                                                |
+------------------------------------------------------------------------------+

Get:1 http://172.17.0.1 wheezy-staging Release.gpg [473 B]
Get:2 http://172.17.0.1 wheezy-staging Release [10.8 kB]
Get:3 http://172.17.0.1 wheezy-staging/main Sources [6082 kB]
Get:4 http://172.17.0.1 wheezy-staging/main armhf Packages [6915 kB]
Ign http://172.17.0.1 wheezy-staging/main Translation-en
Fetched 13.0 MB in 20s (621 kB/s)
Reading package lists...

+------------------------------------------------------------------------------+
| Fetch source files                                                           |
+------------------------------------------------------------------------------+


Check APT
---------

Checking available source versions...

Download source files with APT
------------------------------

Reading package lists...
Building dependency tree...
NOTICE: 'nss' packaging is maintained in the 'Git' version control system at:
git://git.debian.org/git/pkg-mozilla/nss.git
Need to get 6258 kB of source archives.
Get:1 http://172.17.0.1/private/ wheezy-staging/main nss 2:3.14.5-1+deb7u7 (dsc) [2193 B]
Get:2 http://172.17.0.1/private/ wheezy-staging/main nss 2:3.14.5-1+deb7u7 (tar) [6190 kB]
Get:3 http://172.17.0.1/private/ wheezy-staging/main nss 2:3.14.5-1+deb7u7 (diff) [66.7 kB]
Fetched 6258 kB in 3s (1846 kB/s)
Download complete and in download only mode

Check architectures
-------------------


Check dependencies
------------------

Merged Build-Depends: build-essential, fakeroot
Filtered Build-Depends: build-essential, fakeroot
dpkg-deb: building package `sbuild-build-depends-core-dummy' in `/<<BUILDDIR>>/resolver-r3Wzjz/apt_archive/sbuild-build-depends-core-dummy.deb'.
OK
Get:1 file: ./ Release.gpg [316 B]
Get:2 file: ./ Release [2119 B]
Ign file: ./ Translation-en
Reading package lists...
Reading package lists...

+------------------------------------------------------------------------------+
| Install core build dependencies (apt-based resolver)                         |
+------------------------------------------------------------------------------+

Installing build dependencies
Reading package lists...
Building dependency tree...
The following NEW packages will be installed:
  sbuild-build-depends-core-dummy
debconf: delaying package configuration, since apt-utils is not installed
0 upgraded, 1 newly installed, 0 to remove and 11 not upgraded.
Need to get 0 B/702 B of archives.
After this operation, 0 B of additional disk space will be used.
Selecting previously unselected package sbuild-build-depends-core-dummy.
(Reading database ... 11317 files and directories currently installed.)
Unpacking sbuild-build-depends-core-dummy (from .../sbuild-build-depends-core-dummy.deb) ...
Setting up sbuild-build-depends-core-dummy (0.invalid.0) ...
Merged Build-Depends: debhelper (>= 9), dpkg-dev (>= 1.16.1.1~), libnspr4-dev (>= 2:4.9), zlib1g-dev, libsqlite3-dev (>= 3.3.9)
Filtered Build-Depends: debhelper (>= 9), dpkg-dev (>= 1.16.1.1~), libnspr4-dev (>= 2:4.9), zlib1g-dev, libsqlite3-dev (>= 3.3.9)
dpkg-deb: building package `sbuild-build-depends-nss-dummy' in `/<<BUILDDIR>>/resolver-PrrDOq/apt_archive/sbuild-build-depends-nss-dummy.deb'.
OK
Get:1 file: ./ Release.gpg [316 B]
Get:2 file: ./ Release [2119 B]
Ign file: ./ Translation-en
Reading package lists...
Reading package lists...

+------------------------------------------------------------------------------+
| Install nss build dependencies (apt-based resolver)                          |
+------------------------------------------------------------------------------+

Installing build dependencies
Reading package lists...
Building dependency tree...
Reading state information...
The following extra packages will be installed:
  bsdmainutils debhelper file gettext gettext-base groff-base html2text
  intltool-debian libasprintf0c2 libcroco3 libffi5 libgettextpo0 libglib2.0-0
  libmagic1 libnspr4 libnspr4-dev libpcre3 libpipeline1 libsqlite3-0
  libsqlite3-dev libunistring0 libxml2 man-db po-debconf zlib1g-dev
Suggested packages:
  wamerican wordlist whois vacation dh-make gettext-doc groff sqlite3-doc less
  www-browser libmail-box-perl
Recommended packages:
  curl wget lynx-cur autopoint libglib2.0-data shared-mime-info xml-core
  libmail-sendmail-perl
The following NEW packages will be installed:
  bsdmainutils debhelper file gettext gettext-base groff-base html2text
  intltool-debian libasprintf0c2 libcroco3 libffi5 libgettextpo0 libglib2.0-0
  libmagic1 libnspr4 libnspr4-dev libpcre3 libpipeline1 libsqlite3-0
  libsqlite3-dev libunistring0 libxml2 man-db po-debconf
  sbuild-build-depends-nss-dummy zlib1g-dev
0 upgraded, 26 newly installed, 0 to remove and 11 not upgraded.
Need to get 10.7 MB/10.7 MB of archives.
After this operation, 27.7 MB of additional disk space will be used.
Get:1 http://172.17.0.1/private/ wheezy-staging/main libpcre3 armhf 1:8.30-5 [242 kB]
Get:2 http://172.17.0.1/private/ wheezy-staging/main libpipeline1 armhf 1.2.1-1 [35.0 kB]
Get:3 http://172.17.0.1/private/ wheezy-staging/main libasprintf0c2 armhf 0.18.1.1-9 [26.4 kB]
Get:4 http://172.17.0.1/private/ wheezy-staging/main libmagic1 armhf 5.11-2+deb7u9 [201 kB]
Get:5 http://172.17.0.1/private/ wheezy-staging/main libsqlite3-0 armhf 3.7.13-1+deb7u2 [414 kB]
Get:6 http://172.17.0.1/private/ wheezy-staging/main libxml2 armhf 2.8.0+dfsg1-7+wheezy6 [826 kB]
Get:7 http://172.17.0.1/private/ wheezy-staging/main libffi5 armhf 3.0.10-3+b3 [22.9 kB]
Get:8 http://172.17.0.1/private/ wheezy-staging/main libglib2.0-0 armhf 2.33.12+really2.32.4-5 [1689 kB]
Get:9 http://172.17.0.1/private/ wheezy-staging/main libcroco3 armhf 0.6.6-2 [119 kB]
Get:10 http://172.17.0.1/private/ wheezy-staging/main libunistring0 armhf 0.9.3-5 [408 kB]
Get:11 http://172.17.0.1/private/ wheezy-staging/main libgettextpo0 armhf 0.18.1.1-9 [130 kB]
Get:12 http://172.17.0.1/private/ wheezy-staging/main libnspr4 armhf 2:4.9.2-1+deb7u3 [117 kB]
Get:13 http://172.17.0.1/private/ wheezy-staging/main bsdmainutils armhf 9.0.3 [207 kB]
Get:14 http://172.17.0.1/private/ wheezy-staging/main groff-base armhf 1.21-9 [1071 kB]
Get:15 http://172.17.0.1/private/ wheezy-staging/main man-db armhf 2.6.2-1 [1027 kB]
Get:16 http://172.17.0.1/private/ wheezy-staging/main file armhf 5.11-2+deb7u9 [53.2 kB]
Get:17 http://172.17.0.1/private/ wheezy-staging/main gettext-base armhf 0.18.1.1-9 [138 kB]
Get:18 http://172.17.0.1/private/ wheezy-staging/main html2text armhf 1.3.2a-15 [98.5 kB]
Get:19 http://172.17.0.1/private/ wheezy-staging/main gettext armhf 0.18.1.1-9 [1879 kB]
Get:20 http://172.17.0.1/private/ wheezy-staging/main intltool-debian all 0.35.0+20060710.1 [29.8 kB]
Get:21 http://172.17.0.1/private/ wheezy-staging/main po-debconf all 1.0.16+nmu2 [223 kB]
Get:22 http://172.17.0.1/private/ wheezy-staging/main debhelper all 9.20120909 [705 kB]
Get:23 http://172.17.0.1/private/ wheezy-staging/main libnspr4-dev armhf 2:4.9.2-1+deb7u3 [251 kB]
Get:24 http://172.17.0.1/private/ wheezy-staging/main libsqlite3-dev armhf 3.7.13-1+deb7u2 [537 kB]
Get:25 http://172.17.0.1/private/ wheezy-staging/main zlib1g-dev armhf 1:1.2.7.dfsg-13 [212 kB]
debconf: delaying package configuration, since apt-utils is not installed
Fetched 10.7 MB in 5s (1967 kB/s)
Selecting previously unselected package libpcre3:armhf.
(Reading database ... 11317 files and directories currently installed.)
Unpacking libpcre3:armhf (from .../libpcre3_1%3a8.30-5_armhf.deb) ...
Selecting previously unselected package libpipeline1:armhf.
Unpacking libpipeline1:armhf (from .../libpipeline1_1.2.1-1_armhf.deb) ...
Selecting previously unselected package libasprintf0c2:armhf.
Unpacking libasprintf0c2:armhf (from .../libasprintf0c2_0.18.1.1-9_armhf.deb) ...
Selecting previously unselected package libmagic1:armhf.
Unpacking libmagic1:armhf (from .../libmagic1_5.11-2+deb7u9_armhf.deb) ...
Selecting previously unselected package libsqlite3-0:armhf.
Unpacking libsqlite3-0:armhf (from .../libsqlite3-0_3.7.13-1+deb7u2_armhf.deb) ...
Selecting previously unselected package libxml2:armhf.
Unpacking libxml2:armhf (from .../libxml2_2.8.0+dfsg1-7+wheezy6_armhf.deb) ...
Selecting previously unselected package libffi5:armhf.
Unpacking libffi5:armhf (from .../libffi5_3.0.10-3+b3_armhf.deb) ...
Selecting previously unselected package libglib2.0-0:armhf.
Unpacking libglib2.0-0:armhf (from .../libglib2.0-0_2.33.12+really2.32.4-5_armhf.deb) ...
Selecting previously unselected package libcroco3:armhf.
Unpacking libcroco3:armhf (from .../libcroco3_0.6.6-2_armhf.deb) ...
Selecting previously unselected package libunistring0:armhf.
Unpacking libunistring0:armhf (from .../libunistring0_0.9.3-5_armhf.deb) ...
Selecting previously unselected package libgettextpo0:armhf.
Unpacking libgettextpo0:armhf (from .../libgettextpo0_0.18.1.1-9_armhf.deb) ...
Selecting previously unselected package libnspr4:armhf.
Unpacking libnspr4:armhf (from .../libnspr4_2%3a4.9.2-1+deb7u3_armhf.deb) ...
Selecting previously unselected package bsdmainutils.
Unpacking bsdmainutils (from .../bsdmainutils_9.0.3_armhf.deb) ...
Selecting previously unselected package groff-base.
Unpacking groff-base (from .../groff-base_1.21-9_armhf.deb) ...
Selecting previously unselected package man-db.
Unpacking man-db (from .../man-db_2.6.2-1_armhf.deb) ...
Selecting previously unselected package file.
Unpacking file (from .../file_5.11-2+deb7u9_armhf.deb) ...
Selecting previously unselected package gettext-base.
Unpacking gettext-base (from .../gettext-base_0.18.1.1-9_armhf.deb) ...
Selecting previously unselected package html2text.
Unpacking html2text (from .../html2text_1.3.2a-15_armhf.deb) ...
Selecting previously unselected package gettext.
Unpacking gettext (from .../gettext_0.18.1.1-9_armhf.deb) ...
Selecting previously unselected package intltool-debian.
Unpacking intltool-debian (from .../intltool-debian_0.35.0+20060710.1_all.deb) ...
Selecting previously unselected package po-debconf.
Unpacking po-debconf (from .../po-debconf_1.0.16+nmu2_all.deb) ...
Selecting previously unselected package debhelper.
Unpacking debhelper (from .../debhelper_9.20120909_all.deb) ...
Selecting previously unselected package libnspr4-dev.
Unpacking libnspr4-dev (from .../libnspr4-dev_2%3a4.9.2-1+deb7u3_armhf.deb) ...
Selecting previously unselected package libsqlite3-dev.
Unpacking libsqlite3-dev (from .../libsqlite3-dev_3.7.13-1+deb7u2_armhf.deb) ...
Selecting previously unselected package zlib1g-dev:armhf.
Unpacking zlib1g-dev:armhf (from .../zlib1g-dev_1%3a1.2.7.dfsg-13_armhf.deb) ...
Selecting previously unselected package sbuild-build-depends-nss-dummy.
Unpacking sbuild-build-depends-nss-dummy (from .../sbuild-build-depends-nss-dummy.deb) ...
Setting up libpcre3:armhf (1:8.30-5) ...
Setting up libpipeline1:armhf (1.2.1-1) ...
Setting up libasprintf0c2:armhf (0.18.1.1-9) ...
Setting up libmagic1:armhf (5.11-2+deb7u9) ...
Setting up libsqlite3-0:armhf (3.7.13-1+deb7u2) ...
Setting up libxml2:armhf (2.8.0+dfsg1-7+wheezy6) ...
Setting up libffi5:armhf (3.0.10-3+b3) ...
Setting up libglib2.0-0:armhf (2.33.12+really2.32.4-5) ...
No schema files found: doing nothing.
Setting up libcroco3:armhf (0.6.6-2) ...
Setting up libunistring0:armhf (0.9.3-5) ...
Setting up libgettextpo0:armhf (0.18.1.1-9) ...
Setting up libnspr4:armhf (2:4.9.2-1+deb7u3) ...
Setting up bsdmainutils (9.0.3) ...
update-alternatives: using /usr/bin/bsd-write to provide /usr/bin/write (write) in auto mode
update-alternatives: using /usr/bin/bsd-from to provide /usr/bin/from (from) in auto mode
Setting up groff-base (1.21-9) ...
Setting up man-db (2.6.2-1) ...
Building database of manual pages ...
Setting up file (5.11-2+deb7u9) ...
Setting up gettext-base (0.18.1.1-9) ...
Setting up html2text (1.3.2a-15) ...
Setting up gettext (0.18.1.1-9) ...
Setting up intltool-debian (0.35.0+20060710.1) ...
Setting up po-debconf (1.0.16+nmu2) ...
Setting up debhelper (9.20120909) ...
Setting up libnspr4-dev (2:4.9.2-1+deb7u3) ...
Setting up libsqlite3-dev (3.7.13-1+deb7u2) ...
Setting up zlib1g-dev:armhf (1:1.2.7.dfsg-13) ...
Setting up sbuild-build-depends-nss-dummy (0.invalid.0) ...

+------------------------------------------------------------------------------+
| Build environment                                                            |
+------------------------------------------------------------------------------+

Kernel: Linux 3.19.0-trunk-armmp armhf (armv7l)
Toolchain package versions: binutils_2.22-8+deb7u2 dpkg-dev_1.16.16+rpi1 g++-4.6_4.6.3-14+rpi1 gcc-4.6_4.6.3-14+rpi1 libc6-dev_2.13-38+rpi2+deb7u8 libstdc++6_4.7.2-5+rpi1 libstdc++6-4.6-dev_4.6.3-14+rpi1 linux-libc-dev_3.2.51-1+rpi1
Package versions: apt_0.9.7.9+rpi1+deb7u7 base-files_7.1wheezy8+rpi1 base-passwd_3.5.26 bash_4.2+dfsg-0.1+deb7u3 binutils_2.22-8+deb7u2 bsdmainutils_9.0.3 bsdutils_1:2.20.1-5.3 build-essential_11.5+b1 bzip2_1.0.6-4 coreutils_8.13-3.5 cpio_2.11+dfsg-0.1+deb7u1 cpp_4:4.6.3-8 cpp-4.6_4.6.3-14+rpi1 dash_0.5.7-3 debconf_1.5.49 debconf-i18n_1.5.49 debfoster_2.7-1.2 debhelper_9.20120909 debianutils_4.3.2 diffutils_1:3.2-6 dpkg_1.16.16+rpi1 dpkg-dev_1.16.16+rpi1 e2fslibs_1.42.5-1.1+deb7u1 e2fsprogs_1.42.5-1.1+deb7u1 fakeroot_1.18.4-2 file_5.11-2+deb7u9 findutils_4.4.2-4 g++_4:4.6.3-8 g++-4.6_4.6.3-14+rpi1 gcc_4:4.6.3-8 gcc-4.5-base_4.5.3-12+rpi1 gcc-4.6_4.6.3-14+rpi1 gcc-4.6-base_4.6.3-14+rpi1 gcc-4.7-base_4.7.2-5+rpi1 gettext_0.18.1.1-9 gettext-base_0.18.1.1-9 gnupg_1.4.12-7+deb7u7 gpgv_1.4.12-7+deb7u7 grep_2.12-2 groff-base_1.21-9 gzip_1.5-1.1 hostname_3.11 html2text_1.3.2a-15 initramfs-tools_0.115~bpo70+1 initscripts_2.88dsf-41+deb7u1 insserv_1.14.0-5 intltool-debian_0.35.0+20060710.1 klibc-utils_2.0.1-3.1+rpi1 kmod_9-3 libacl1_2.2.51-8 libapt-pkg4.12_0.9.7.9+rpi1+deb7u7 libasprintf0c2_0.18.1.1-9 libattr1_1:2.4.46-8 libblkid1_2.20.1-5.3 libbz2-1.0_1.0.6-4 libc-bin_2.13-38+rpi2+deb7u8 libc-dev-bin_2.13-38+rpi2+deb7u8 libc6_2.13-38+rpi2+deb7u8 libc6-dev_2.13-38+rpi2+deb7u8 libclass-isa-perl_0.36-3 libcomerr2_1.42.5-1.1+deb7u1 libcroco3_0.6.6-2 libdb5.1_5.1.29-5 libdbus-1-3_1.6.8-1+deb7u6 libdpkg-perl_1.16.16+rpi1 libffi5_3.0.10-3+b3 libgc1c2_1:7.1-9.1 libgcc1_1:4.7.2-5+rpi1 libgdbm3_1.8.3-11 libgettextpo0_0.18.1.1-9 libglib2.0-0_2.33.12+really2.32.4-5 libgmp10_2:5.0.5+dfsg-2 libgomp1_4.7.2-5+rpi1 libklibc_2.0.1-3.1+rpi1 libkmod2_9-3 liblocale-gettext-perl_1.05-7 liblzma5_5.1.1alpha+20120614-2 libmagic1_5.11-2+deb7u9 libmount1_2.20.1-5.3 libmpc2_0.9-4 libmpfr4_3.1.0-5 libncurses5_5.9-10 libncursesw5_5.9-10 libnih-dbus1_1.0.3-4.1 libnih1_1.0.3-4.1 libnspr4_2:4.9.2-1+deb7u3 libnspr4-dev_2:4.9.2-1+deb7u3 libpam-modules_1.1.3-7.1 libpam-modules-bin_1.1.3-7.1 libpam-runtime_1.1.3-7.1 libpam0g_1.1.3-7.1 libpcre3_1:8.30-5 libpipeline1_1.2.1-1 libprocps0_1:3.3.3-3 libreadline6_6.2+dfsg-0.1 libselinux1_2.1.9-5 libsemanage-common_2.1.6-6 libsemanage1_2.1.6-6 libsepol1_2.1.4-3 libslang2_2.2.4-15 libsqlite3-0_3.7.13-1+deb7u2 libsqlite3-dev_3.7.13-1+deb7u2 libss2_1.42.5-1.1+deb7u1 libstdc++6_4.7.2-5+rpi1 libstdc++6-4.6-dev_4.6.3-14+rpi1 libswitch-perl_2.16-2 libtext-charwidth-perl_0.04-7 libtext-iconv-perl_1.7-5 libtext-wrapi18n-perl_0.06-7 libtimedate-perl_1.2000-1 libtinfo5_5.9-10 libudev0_175-7.2 libunistring0_0.9.3-5 libusb-0.1-4_2:0.1.12-20+nmu1 libustr-1.0-1_1.0.4-3 libuuid1_2.20.1-5.3 libxml2_2.8.0+dfsg1-7+wheezy6 linux-libc-dev_3.2.51-1+rpi1 login_1:4.1.5.1-1 lsb-base_4.1+Debian8+rpi1+deb7u1 make_3.81-8.2 makedev_2.3.1-92 man-db_2.6.2-1 mawk_1.3.3-17 mount_2.20.1-5.3 mountall_2.46 multiarch-support_2.13-38+rpi2+deb7u8 ncurses-base_5.9-10 ncurses-bin_5.9-10 passwd_1:4.1.5.1-1 patch_2.6.1-3 perl_5.14.2-21+rpi2+deb7u2 perl-base_5.14.2-21+rpi2+deb7u2 perl-modules_5.14.2-21+rpi2+deb7u2 plymouth_0.8.5.1-5 po-debconf_1.0.16+nmu2 procps_1:3.3.3-3 raspbian-archive-keyring_20120528.2 readline-common_6.2+dfsg-0.1 sbuild-build-depends-core-dummy_0.invalid.0 sbuild-build-depends-nss-dummy_0.invalid.0 sed_4.2.1-10 sensible-utils_0.0.7 sysv-rc_2.88dsf-41+deb7u1 sysvinit_2.88dsf-41+deb7u1 sysvinit-utils_2.88dsf-41+deb7u1 tar_1.26+dfsg-0.1 tzdata_2015f-0+deb7u1 udev_175-7.2 util-linux_2.20.1-5.3 xz-utils_5.1.1alpha+20120614-2 zlib1g_1:1.2.7.dfsg-13 zlib1g-dev_1:1.2.7.dfsg-13

+------------------------------------------------------------------------------+
| Build                                                                        |
+------------------------------------------------------------------------------+


Unpack source
-------------

gpgv: keyblock resource `/sbuild-nonexistent/.gnupg/trustedkeys.gpg': file open error
gpgv: Signature made Fri Jun  3 22:05:14 2016 UTC using RSA key ID 9426876F
gpgv: Can't check signature: public key not found
dpkg-source: warning: failed to verify signature on ./nss_3.14.5-1+deb7u7.dsc
dpkg-source: info: extracting nss in nss-3.14.5
dpkg-source: info: unpacking nss_3.14.5.orig.tar.gz
dpkg-source: info: unpacking nss_3.14.5-1+deb7u7.debian.tar.gz
dpkg-source: info: applying 38_hurd.patch
dpkg-source: info: applying 38_kbsd.patch
dpkg-source: info: applying 80_security_tools.patch
dpkg-source: info: applying 85_security_load.patch
dpkg-source: info: applying 95_add_spi+cacert_ca_certs.patch
dpkg-source: info: applying 97_SSL_RENEGOTIATE_TRANSITIONAL.patch
dpkg-source: info: applying lower-dhe-priority.patch
dpkg-source: info: applying CVE-2013-1741.patch
dpkg-source: info: applying CVE-2013-5606.patch
dpkg-source: info: applying CVE-2014-1491.patch
dpkg-source: info: applying CVE-2014-1492.patch
dpkg-source: info: applying CVE-2014-1568.patch
dpkg-source: info: applying CVE-2014-1544.patch
dpkg-source: info: applying CVE-2014-1569.patch
dpkg-source: info: applying CVE-2015-2721.patch
dpkg-source: info: applying CVE-2015-2730.patch
dpkg-source: info: applying CVE-2015-7182.patch
dpkg-source: info: applying CVE-2015-7181.patch
dpkg-source: info: applying CVE-2016-1938.patch
dpkg-source: info: applying CVE-2016-1950.patch
dpkg-source: info: applying CVE-2016-1978.patch
dpkg-source: info: applying CVE-2016-1979.patch
dpkg-source: info: applying CVE-2015-4000.patch

Check disc space
----------------

Sufficient free space for build

User Environment
----------------

DEB_BUILD_OPTIONS=parallel=4
HOME=/sbuild-nonexistent
LOGNAME=buildd
PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games
SCHROOT_ALIAS_NAME=wheezy-staging-armhf-sbuild
SCHROOT_CHROOT_NAME=wheezy-staging-armhf-sbuild
SCHROOT_COMMAND=env
SCHROOT_GID=111
SCHROOT_GROUP=buildd
SCHROOT_SESSION_ID=wheezy-staging-armhf-sbuild-2e2b15e2-02f1-42d7-b114-f35698d6a6ba
SCHROOT_UID=106
SCHROOT_USER=buildd
SHELL=/bin/sh
TERM=linux
USER=buildd

dpkg-buildpackage
-----------------

dpkg-buildpackage: source package nss
dpkg-buildpackage: source version 2:3.14.5-1+deb7u7
 dpkg-source --before-build nss-3.14.5
dpkg-buildpackage: host architecture armhf
 fakeroot debian/rules clean
dh clean
   dh_testdir
   debian/rules override_dh_auto_clean
make[1]: Entering directory `/<<PKGBUILDDIR>>'
/usr/bin/make -C mozilla/security/nss \
		clobber \
		clobber_dbm \
		clobber_coreconf \
		SOURCE_MD_DIR=/<<PKGBUILDDIR>>/mozilla/dist \
		DIST=/<<PKGBUILDDIR>>/mozilla/dist \
		BUILD_OPT=1 \
		
make[2]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss'
rm -rf     Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
cd lib; /usr/bin/make clobber
make[3]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib'
rm -rf     Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
cd util; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/util'
rm -rf Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssutil.a Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssutil3.so  Linux3.19_arm_glibc_PTH_OPT.OBJ/quickder.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secdig.o Linux3.19_arm_glibc_PTH_OPT.OBJ/derdec.o Linux3.19_arm_glibc_PTH_OPT.OBJ/derenc.o Linux3.19_arm_glibc_PTH_OPT.OBJ/dersubr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/dertime.o Linux3.19_arm_glibc_PTH_OPT.OBJ/errstrs.o Linux3.19_arm_glibc_PTH_OPT.OBJ/nssb64d.o Linux3.19_arm_glibc_PTH_OPT.OBJ/nssb64e.o Linux3.19_arm_glibc_PTH_OPT.OBJ/nssrwlk.o Linux3.19_arm_glibc_PTH_OPT.OBJ/nssilock.o Linux3.19_arm_glibc_PTH_OPT.OBJ/oidstring.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkcs1sig.o Linux3.19_arm_glibc_PTH_OPT.OBJ/portreg.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secalgid.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secasn1d.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secasn1e.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secasn1u.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secitem.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secload.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secoid.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sectime.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secport.o Linux3.19_arm_glibc_PTH_OPT.OBJ/templates.o Linux3.19_arm_glibc_PTH_OPT.OBJ/utf8.o Linux3.19_arm_glibc_PTH_OPT.OBJ/utilmod.o Linux3.19_arm_glibc_PTH_OPT.OBJ/utilpars.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/util'
cd freebl; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/freebl'
rm -rf Linux3.19_arm_glibc_PTH_OPT.OBJ/libfreebl.a Linux3.19_arm_glibc_PTH_OPT.OBJ/libfreebl3.so  Linux3.19_arm_glibc_PTH_OPT.OBJ/loader.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core   so_locations  Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB 
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/freebl'
cd sqlite; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/sqlite'
rm -rf Linux3.19_arm_glibc_PTH_OPT.OBJ/libsqlite.a Linux3.19_arm_glibc_PTH_OPT.OBJ/libsqlite3.so  Linux3.19_arm_glibc_PTH_OPT.OBJ/sqlite3.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/sqlite'
cd softoken; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/softoken'
rm -rf Linux3.19_arm_glibc_PTH_OPT.OBJ/libsoftokn.a Linux3.19_arm_glibc_PTH_OPT.OBJ/libsoftokn3.so  Linux3.19_arm_glibc_PTH_OPT.OBJ/ecdecode.o Linux3.19_arm_glibc_PTH_OPT.OBJ/fipsaudt.o Linux3.19_arm_glibc_PTH_OPT.OBJ/fipstest.o Linux3.19_arm_glibc_PTH_OPT.OBJ/fipstokn.o Linux3.19_arm_glibc_PTH_OPT.OBJ/lgglue.o Linux3.19_arm_glibc_PTH_OPT.OBJ/lowkey.o Linux3.19_arm_glibc_PTH_OPT.OBJ/lowpbe.o Linux3.19_arm_glibc_PTH_OPT.OBJ/padbuf.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkcs11.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkcs11c.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkcs11u.o Linux3.19_arm_glibc_PTH_OPT.OBJ/rsawrapr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sdb.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sftkdb.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sftkhmac.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sftkpars.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sftkpwd.o Linux3.19_arm_glibc_PTH_OPT.OBJ/softkver.o Linux3.19_arm_glibc_PTH_OPT.OBJ/tlsprf.o Linux3.19_arm_glibc_PTH_OPT.OBJ/jpakesftk.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
cd legacydb; /usr/bin/make clobber
make[5]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/softoken/legacydb'
rm -rf Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssdbm.a Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssdbm3.so  Linux3.19_arm_glibc_PTH_OPT.OBJ/dbmshim.o Linux3.19_arm_glibc_PTH_OPT.OBJ/keydb.o Linux3.19_arm_glibc_PTH_OPT.OBJ/lgattr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/lgcreate.o Linux3.19_arm_glibc_PTH_OPT.OBJ/lgdestroy.o Linux3.19_arm_glibc_PTH_OPT.OBJ/lgfind.o Linux3.19_arm_glibc_PTH_OPT.OBJ/lginit.o Linux3.19_arm_glibc_PTH_OPT.OBJ/lgutil.o Linux3.19_arm_glibc_PTH_OPT.OBJ/lowcert.o Linux3.19_arm_glibc_PTH_OPT.OBJ/lowkey.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pcertdb.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11db.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[5]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/softoken/legacydb'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/softoken'
cd base; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/base'
rm -rf Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssb.a Linux3.19_arm_glibc_PTH_OPT.OBJ/arena.o Linux3.19_arm_glibc_PTH_OPT.OBJ/error.o Linux3.19_arm_glibc_PTH_OPT.OBJ/errorval.o Linux3.19_arm_glibc_PTH_OPT.OBJ/hashops.o Linux3.19_arm_glibc_PTH_OPT.OBJ/libc.o Linux3.19_arm_glibc_PTH_OPT.OBJ/tracker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/item.o Linux3.19_arm_glibc_PTH_OPT.OBJ/utf8.o Linux3.19_arm_glibc_PTH_OPT.OBJ/list.o Linux3.19_arm_glibc_PTH_OPT.OBJ/hash.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/base'
cd dev; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/dev'
rm -rf Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssdev.a Linux3.19_arm_glibc_PTH_OPT.OBJ/devslot.o Linux3.19_arm_glibc_PTH_OPT.OBJ/devtoken.o Linux3.19_arm_glibc_PTH_OPT.OBJ/devutil.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ckhelper.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/dev'
cd pki; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/pki'
rm -rf Linux3.19_arm_glibc_PTH_OPT.OBJ/libnsspki.a Linux3.19_arm_glibc_PTH_OPT.OBJ/asymmkey.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certificate.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cryptocontext.o Linux3.19_arm_glibc_PTH_OPT.OBJ/symmkey.o Linux3.19_arm_glibc_PTH_OPT.OBJ/trustdomain.o Linux3.19_arm_glibc_PTH_OPT.OBJ/tdcache.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certdecode.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkistore.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkibase.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pki3hack.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/pki'
cd libpkix; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
cd include; /usr/bin/make clobber
make[5]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/include'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[5]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/include'
cd pkix; /usr/bin/make clobber
make[5]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
cd certsel; /usr/bin/make clobber
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/certsel'
rm -rf Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixcertsel.a Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_certselector.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/certsel'
cd crlsel; /usr/bin/make clobber
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/crlsel'
rm -rf Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixcrlsel.a Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_crlselector.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/crlsel'
cd checker; /usr/bin/make clobber
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/checker'
rm -rf Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixchecker.a Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_crlchecker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_policychecker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/checker'
cd params; /usr/bin/make clobber
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/params'
rm -rf Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixparams.a Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_trustanchor.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_procparams.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_valparams.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/params'
cd results; /usr/bin/make clobber
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/results'
rm -rf Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixresults.a Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_buildresult.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_policynode.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_valresult.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_verifynode.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/results'
cd store; /usr/bin/make clobber
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/store'
rm -rf Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixstore.a Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_store.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/store'
cd top; /usr/bin/make clobber
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/top'
rm -rf Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixtop.a Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_validate.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_lifecycle.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_build.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/top'
cd util; /usr/bin/make clobber
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/util'
rm -rf Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixutil.a Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_tools.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_error.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_logger.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_list.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_errpaths.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/util'
make[5]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix'
cd pkix_pl_nss; /usr/bin/make clobber
make[5]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix_pl_nss'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
cd pki; /usr/bin/make clobber
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki'
rm -rf Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixpki.a Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_cert.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_crl.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_date.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki'
cd system; /usr/bin/make clobber
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system'
rm -rf Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixsystem.a Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_common.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_error.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_mem.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_object.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_oid.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_string.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system'
cd module; /usr/bin/make clobber
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module'
rm -rf Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixmodule.a Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_socket.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module'
make[5]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix_pl_nss'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix'
cd certdb; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/certdb'
rm -rf Linux3.19_arm_glibc_PTH_OPT.OBJ/libcertdb.a Linux3.19_arm_glibc_PTH_OPT.OBJ/alg1485.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certdb.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certv3.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certxutl.o Linux3.19_arm_glibc_PTH_OPT.OBJ/crl.o Linux3.19_arm_glibc_PTH_OPT.OBJ/genname.o Linux3.19_arm_glibc_PTH_OPT.OBJ/stanpcertdb.o Linux3.19_arm_glibc_PTH_OPT.OBJ/polcyxtn.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secname.o Linux3.19_arm_glibc_PTH_OPT.OBJ/xauthkid.o Linux3.19_arm_glibc_PTH_OPT.OBJ/xbsconst.o Linux3.19_arm_glibc_PTH_OPT.OBJ/xconst.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/certdb'
cd certhigh; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/certhigh'
rm -rf Linux3.19_arm_glibc_PTH_OPT.OBJ/libcerthi.a Linux3.19_arm_glibc_PTH_OPT.OBJ/certhtml.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certreq.o Linux3.19_arm_glibc_PTH_OPT.OBJ/crlv2.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ocsp.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ocspsig.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certhigh.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certvfy.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certvfypkix.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certvfypkixprint.o Linux3.19_arm_glibc_PTH_OPT.OBJ/xcrldist.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/certhigh'
cd pk11wrap; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/pk11wrap'
rm -rf Linux3.19_arm_glibc_PTH_OPT.OBJ/libpk11wrap.a Linux3.19_arm_glibc_PTH_OPT.OBJ/dev3hack.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11akey.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11auth.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11cert.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11cxt.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11err.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11kea.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11list.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11load.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11mech.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11merge.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11nobj.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11obj.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11pars.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11pbe.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11pk12.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11pqg.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11sdr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11skey.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11slot.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11util.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/pk11wrap'
cd cryptohi; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/cryptohi'
rm -rf Linux3.19_arm_glibc_PTH_OPT.OBJ/libcryptohi.a Linux3.19_arm_glibc_PTH_OPT.OBJ/sechash.o Linux3.19_arm_glibc_PTH_OPT.OBJ/seckey.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secsign.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secvfy.o Linux3.19_arm_glibc_PTH_OPT.OBJ/dsautil.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/cryptohi'
cd nss; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/nss'
rm -rf Linux3.19_arm_glibc_PTH_OPT.OBJ/libnss.a Linux3.19_arm_glibc_PTH_OPT.OBJ/libnss3.so  Linux3.19_arm_glibc_PTH_OPT.OBJ/nssinit.o Linux3.19_arm_glibc_PTH_OPT.OBJ/nssver.o Linux3.19_arm_glibc_PTH_OPT.OBJ/utilwrap.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/nss'
cd ssl; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/ssl'
rm -rf Linux3.19_arm_glibc_PTH_OPT.OBJ/libssl.a Linux3.19_arm_glibc_PTH_OPT.OBJ/libssl3.so  Linux3.19_arm_glibc_PTH_OPT.OBJ/derive.o Linux3.19_arm_glibc_PTH_OPT.OBJ/dtlscon.o Linux3.19_arm_glibc_PTH_OPT.OBJ/prelib.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssl3con.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssl3gthr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslauth.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslcon.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssldef.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslenum.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslerr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslerrstrs.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslinit.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssl3ext.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslgathr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslmutex.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslnonce.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslreveal.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslsecur.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslsnce.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslsock.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssltrace.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslver.o Linux3.19_arm_glibc_PTH_OPT.OBJ/authcert.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmpcert.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslinfo.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssl3ecc.o Linux3.19_arm_glibc_PTH_OPT.OBJ/unix_err.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/ssl'
cd pkcs12; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/pkcs12'
rm -rf Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkcs12.a Linux3.19_arm_glibc_PTH_OPT.OBJ/p12local.o Linux3.19_arm_glibc_PTH_OPT.OBJ/p12creat.o Linux3.19_arm_glibc_PTH_OPT.OBJ/p12dec.o Linux3.19_arm_glibc_PTH_OPT.OBJ/p12plcy.o Linux3.19_arm_glibc_PTH_OPT.OBJ/p12tmpl.o Linux3.19_arm_glibc_PTH_OPT.OBJ/p12e.o Linux3.19_arm_glibc_PTH_OPT.OBJ/p12d.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/pkcs12'
cd pkcs7; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/pkcs7'
rm -rf Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkcs7.a Linux3.19_arm_glibc_PTH_OPT.OBJ/certread.o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7common.o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7create.o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7decode.o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7encode.o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7local.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secmime.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/pkcs7'
cd smime; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/smime'
rm -rf Linux3.19_arm_glibc_PTH_OPT.OBJ/libsmime.a Linux3.19_arm_glibc_PTH_OPT.OBJ/libsmime3.so  Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsarray.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsasn1.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsattr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmscinfo.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmscipher.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsdecode.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsdigdata.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsdigest.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsencdata.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsencode.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsenvdata.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsmessage.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmspubkey.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsrecinfo.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsreclist.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmssigdata.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmssiginfo.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsudf.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsutil.o Linux3.19_arm_glibc_PTH_OPT.OBJ/smimemessage.o Linux3.19_arm_glibc_PTH_OPT.OBJ/smimeutil.o Linux3.19_arm_glibc_PTH_OPT.OBJ/smimever.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/smime'
cd crmf; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/crmf'
rm -rf Linux3.19_arm_glibc_PTH_OPT.OBJ/libcrmf.a Linux3.19_arm_glibc_PTH_OPT.OBJ/crmfenc.o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmftmpl.o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmfreq.o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmfpop.o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmfdec.o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmfget.o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmfcont.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmmfasn1.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmmfresp.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmmfrec.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmmfchal.o Linux3.19_arm_glibc_PTH_OPT.OBJ/servget.o Linux3.19_arm_glibc_PTH_OPT.OBJ/encutil.o Linux3.19_arm_glibc_PTH_OPT.OBJ/respcli.o Linux3.19_arm_glibc_PTH_OPT.OBJ/respcmn.o Linux3.19_arm_glibc_PTH_OPT.OBJ/challcli.o Linux3.19_arm_glibc_PTH_OPT.OBJ/asn1cmn.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/crmf'
cd jar; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/jar'
rm -rf Linux3.19_arm_glibc_PTH_OPT.OBJ/libjar.a Linux3.19_arm_glibc_PTH_OPT.OBJ/jarver.o Linux3.19_arm_glibc_PTH_OPT.OBJ/jarsign.o Linux3.19_arm_glibc_PTH_OPT.OBJ/jar.o Linux3.19_arm_glibc_PTH_OPT.OBJ/jar-ds.o Linux3.19_arm_glibc_PTH_OPT.OBJ/jarfile.o Linux3.19_arm_glibc_PTH_OPT.OBJ/jarint.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/jar'
cd ckfw; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/ckfw'
rm -rf Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssckfw.a Linux3.19_arm_glibc_PTH_OPT.OBJ/crypto.o Linux3.19_arm_glibc_PTH_OPT.OBJ/find.o Linux3.19_arm_glibc_PTH_OPT.OBJ/hash.o Linux3.19_arm_glibc_PTH_OPT.OBJ/instance.o Linux3.19_arm_glibc_PTH_OPT.OBJ/mutex.o Linux3.19_arm_glibc_PTH_OPT.OBJ/object.o Linux3.19_arm_glibc_PTH_OPT.OBJ/session.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sessobj.o Linux3.19_arm_glibc_PTH_OPT.OBJ/slot.o Linux3.19_arm_glibc_PTH_OPT.OBJ/token.o Linux3.19_arm_glibc_PTH_OPT.OBJ/wrap.o Linux3.19_arm_glibc_PTH_OPT.OBJ/mechanism.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
cd builtins; /usr/bin/make clobber
make[5]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/ckfw/builtins'
rm -rf Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssckbi.so Linux3.19_arm_glibc_PTH_OPT.OBJ/anchor.o Linux3.19_arm_glibc_PTH_OPT.OBJ/constants.o Linux3.19_arm_glibc_PTH_OPT.OBJ/bfind.o Linux3.19_arm_glibc_PTH_OPT.OBJ/binst.o Linux3.19_arm_glibc_PTH_OPT.OBJ/bobject.o Linux3.19_arm_glibc_PTH_OPT.OBJ/bsession.o Linux3.19_arm_glibc_PTH_OPT.OBJ/bslot.o Linux3.19_arm_glibc_PTH_OPT.OBJ/btoken.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certdata.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ckbiver.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[5]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/ckfw/builtins'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/ckfw'
cd sysinit; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/sysinit'
rm -rf Linux3.19_arm_glibc_PTH_OPT.OBJ/libnsssysinit.a Linux3.19_arm_glibc_PTH_OPT.OBJ/libnsssysinit.so  Linux3.19_arm_glibc_PTH_OPT.OBJ/nsssysinit.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/sysinit'
make[3]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib'
cd cmd; /usr/bin/make clobber
make[3]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd'
rm -rf     Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
cd lib; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/lib'
rm -rf Linux3.19_arm_glibc_PTH_OPT.OBJ/libsectool.a Linux3.19_arm_glibc_PTH_OPT.OBJ/basicutil.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secutil.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secpwd.o Linux3.19_arm_glibc_PTH_OPT.OBJ/derprint.o Linux3.19_arm_glibc_PTH_OPT.OBJ/moreoids.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pppolicy.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ffs.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11table.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/lib'
cd addbuiltin; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/addbuiltin'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ/addbuiltin Linux3.19_arm_glibc_PTH_OPT.OBJ/addbuiltin.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/addbuiltin'
cd atob; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/atob'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ/atob Linux3.19_arm_glibc_PTH_OPT.OBJ/atob.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/atob'
cd bltest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/bltest'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ/bltest Linux3.19_arm_glibc_PTH_OPT.OBJ/blapitest.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/bltest'
cd btoa; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/btoa'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ/btoa Linux3.19_arm_glibc_PTH_OPT.OBJ/btoa.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/btoa'
cd certcgi; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/certcgi'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ/certcgi Linux3.19_arm_glibc_PTH_OPT.OBJ/certcgi.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/certcgi'
cd certutil; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/certutil'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ/certutil Linux3.19_arm_glibc_PTH_OPT.OBJ/certext.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certutil.o Linux3.19_arm_glibc_PTH_OPT.OBJ/keystuff.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/certutil'
cd checkcert; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/checkcert'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ/checkcert Linux3.19_arm_glibc_PTH_OPT.OBJ/checkcert.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/checkcert'
cd chktest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/chktest'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ/chktest Linux3.19_arm_glibc_PTH_OPT.OBJ/chktest.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/chktest'
cd crlutil; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/crlutil'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ/crlutil Linux3.19_arm_glibc_PTH_OPT.OBJ/crlgen_lex.o Linux3.19_arm_glibc_PTH_OPT.OBJ/crlgen.o Linux3.19_arm_glibc_PTH_OPT.OBJ/crlutil.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/crlutil'
cd crmftest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/crmftest'
rm -rf Linux3.19_arm_glibc_PTH_OPT.OBJ/crmftest Linux3.19_arm_glibc_PTH_OPT.OBJ/testcrmf.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/crmftest'
cd dbtest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/dbtest'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ/dbtest Linux3.19_arm_glibc_PTH_OPT.OBJ/dbtest.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/dbtest'
cd derdump; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/derdump'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ/derdump Linux3.19_arm_glibc_PTH_OPT.OBJ/derdump.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/derdump'
cd digest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/digest'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ/digest Linux3.19_arm_glibc_PTH_OPT.OBJ/digest.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/digest'
cd httpserv; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/httpserv'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ/httpserv Linux3.19_arm_glibc_PTH_OPT.OBJ/httpserv.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/httpserv'
cd fipstest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/fipstest'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ/fipstest Linux3.19_arm_glibc_PTH_OPT.OBJ/fipstest.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/fipstest'
cd lowhashtest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/lowhashtest'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ/lowhashtest Linux3.19_arm_glibc_PTH_OPT.OBJ/lowhashtest.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/lowhashtest'
cd listsuites; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/listsuites'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ/listsuites Linux3.19_arm_glibc_PTH_OPT.OBJ/listsuites.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/listsuites'
cd makepqg; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/makepqg'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ/makepqg Linux3.19_arm_glibc_PTH_OPT.OBJ/makepqg.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/makepqg'
cd multinit; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/multinit'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ/multinit Linux3.19_arm_glibc_PTH_OPT.OBJ/multinit.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/multinit'
cd ocspclnt; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/ocspclnt'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ/ocspclnt Linux3.19_arm_glibc_PTH_OPT.OBJ/ocspclnt.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/ocspclnt'
cd ocspresp; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/ocspresp'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ/ocspresp Linux3.19_arm_glibc_PTH_OPT.OBJ/ocspresp.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/ocspresp'
cd oidcalc; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/oidcalc'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ/oidcalc Linux3.19_arm_glibc_PTH_OPT.OBJ/oidcalc.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/oidcalc'
cd p7content; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/p7content'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ/p7content Linux3.19_arm_glibc_PTH_OPT.OBJ/p7content.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/p7content'
cd p7env; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/p7env'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ/p7env Linux3.19_arm_glibc_PTH_OPT.OBJ/p7env.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/p7env'
cd p7sign; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/p7sign'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ/p7sign Linux3.19_arm_glibc_PTH_OPT.OBJ/p7sign.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/p7sign'
cd p7verify; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/p7verify'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ/p7verify Linux3.19_arm_glibc_PTH_OPT.OBJ/p7verify.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/p7verify'
cd pk12util; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/pk12util'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ/pk12util Linux3.19_arm_glibc_PTH_OPT.OBJ/pk12util.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/pk12util'
cd pk11mode; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/pk11mode'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11mode Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11mode.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/pk11mode'
cd pk1sign; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/pk1sign'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ/pk1sign Linux3.19_arm_glibc_PTH_OPT.OBJ/pk1sign.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/pk1sign'
cd pkix-errcodes; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/pkix-errcodes'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix-errcodes Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix-errcodes.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/pkix-errcodes'
cd pp; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/pp'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ/pp Linux3.19_arm_glibc_PTH_OPT.OBJ/pp.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/pp'
cd pwdecrypt; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/pwdecrypt'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ/pwdecrypt Linux3.19_arm_glibc_PTH_OPT.OBJ/pwdecrypt.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/pwdecrypt'
cd rsaperf; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/rsaperf'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ/rsaperf Linux3.19_arm_glibc_PTH_OPT.OBJ/rsaperf.o Linux3.19_arm_glibc_PTH_OPT.OBJ/defkey.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/rsaperf'
cd sdrtest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/sdrtest'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ/sdrtest Linux3.19_arm_glibc_PTH_OPT.OBJ/sdrtest.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/sdrtest'
cd selfserv; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/selfserv'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ/selfserv Linux3.19_arm_glibc_PTH_OPT.OBJ/selfserv.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/selfserv'
cd signtool; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/signtool'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ/signtool Linux3.19_arm_glibc_PTH_OPT.OBJ/signtool.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certgen.o Linux3.19_arm_glibc_PTH_OPT.OBJ/javascript.o Linux3.19_arm_glibc_PTH_OPT.OBJ/list.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sign.o Linux3.19_arm_glibc_PTH_OPT.OBJ/util.o Linux3.19_arm_glibc_PTH_OPT.OBJ/verify.o Linux3.19_arm_glibc_PTH_OPT.OBJ/zip.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/signtool'
cd signver; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/signver'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ/signver Linux3.19_arm_glibc_PTH_OPT.OBJ/signver.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk7print.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/signver'
cd shlibsign; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/shlibsign'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ/shlibsign Linux3.19_arm_glibc_PTH_OPT.OBJ/shlibsign.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations   /<<PKGBUILDDIR>>/mozilla/dist/lib/libsoftokn3.chk /<<PKGBUILDDIR>>/mozilla/dist/lib/libnssdbm3.chk
cd mangle; /usr/bin/make clobber
make[5]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/shlibsign/mangle'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ/mangle Linux3.19_arm_glibc_PTH_OPT.OBJ/mangle.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[5]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/shlibsign/mangle'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/shlibsign'
cd smimetools; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/smimetools'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsutil Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsutil.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/smimetools'
cd ssltap; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/ssltap'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ/ssltap Linux3.19_arm_glibc_PTH_OPT.OBJ/ssltap.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/ssltap'
cd strsclnt; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/strsclnt'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ/strsclnt Linux3.19_arm_glibc_PTH_OPT.OBJ/strsclnt.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/strsclnt'
cd symkeyutil; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/symkeyutil'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ/symkeyutil Linux3.19_arm_glibc_PTH_OPT.OBJ/symkeyutil.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/symkeyutil'
cd tests; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/tests'
rm -rf Linux3.19_arm_glibc_PTH_OPT.OBJ/baddbdir Linux3.19_arm_glibc_PTH_OPT.OBJ/conflict Linux3.19_arm_glibc_PTH_OPT.OBJ/dertimetest Linux3.19_arm_glibc_PTH_OPT.OBJ/encodeinttest Linux3.19_arm_glibc_PTH_OPT.OBJ/nonspr10 Linux3.19_arm_glibc_PTH_OPT.OBJ/remtest Linux3.19_arm_glibc_PTH_OPT.OBJ/secmodtest Linux3.19_arm_glibc_PTH_OPT.OBJ/baddbdir.o Linux3.19_arm_glibc_PTH_OPT.OBJ/conflict.o Linux3.19_arm_glibc_PTH_OPT.OBJ/dertimetest.o Linux3.19_arm_glibc_PTH_OPT.OBJ/encodeinttest.o Linux3.19_arm_glibc_PTH_OPT.OBJ/nonspr10.o Linux3.19_arm_glibc_PTH_OPT.OBJ/remtest.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secmodtest.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/tests'
cd tstclnt; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/tstclnt'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ/tstclnt Linux3.19_arm_glibc_PTH_OPT.OBJ/tstclnt.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/tstclnt'
cd vfychain; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/vfychain'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ/vfychain Linux3.19_arm_glibc_PTH_OPT.OBJ/vfychain.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/vfychain'
cd vfyserv; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/vfyserv'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ/vfyserv Linux3.19_arm_glibc_PTH_OPT.OBJ/vfyserv.o Linux3.19_arm_glibc_PTH_OPT.OBJ/vfyutil.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/vfyserv'
cd modutil; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/modutil'
rm -rf   Linux3.19_arm_glibc_PTH_OPT.OBJ/modutil Linux3.19_arm_glibc_PTH_OPT.OBJ/modutil.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11.o Linux3.19_arm_glibc_PTH_OPT.OBJ/instsec.o Linux3.19_arm_glibc_PTH_OPT.OBJ/install.o Linux3.19_arm_glibc_PTH_OPT.OBJ/installparse.o Linux3.19_arm_glibc_PTH_OPT.OBJ/install-ds.o Linux3.19_arm_glibc_PTH_OPT.OBJ/lex.Pk11Install_yy.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/modutil'
make[3]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd'
/usr/bin/make -C ../dbm clobber
make[3]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/dbm'
rm -rf     Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
cd include; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/dbm/include'
rm -rf     Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/dbm/include'
cd src; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/dbm/src'
rm -rf Linux3.19_arm_glibc_PTH_OPT.OBJ/libdbm.a Linux3.19_arm_glibc_PTH_OPT.OBJ/db.o Linux3.19_arm_glibc_PTH_OPT.OBJ/h_bigkey.o Linux3.19_arm_glibc_PTH_OPT.OBJ/h_func.o Linux3.19_arm_glibc_PTH_OPT.OBJ/h_log2.o Linux3.19_arm_glibc_PTH_OPT.OBJ/h_page.o Linux3.19_arm_glibc_PTH_OPT.OBJ/hash.o Linux3.19_arm_glibc_PTH_OPT.OBJ/hash_buf.o Linux3.19_arm_glibc_PTH_OPT.OBJ/mktemp.o Linux3.19_arm_glibc_PTH_OPT.OBJ/dirent.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/dbm/src'
make[3]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/dbm'
/usr/bin/make -C ../coreconf clobber
make[3]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/coreconf'
rm -rf     Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
cd nsinstall; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/coreconf/nsinstall'
rm -rf Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pathsub.o Linux3.19_arm_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.19_arm_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/coreconf/nsinstall'
make[3]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/coreconf'
make[2]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss'
rm -rf /<<PKGBUILDDIR>>/mozilla/dist debian/libnss3-1d.links debian/libnss3-dev.links debian/libnss3.lintian-overrides debian/nss-config debian/nss.pc
make[1]: Leaving directory `/<<PKGBUILDDIR>>'
   dh_clean
 debian/rules build-arch
dh build-arch
   dh_testdir -a
   dh_auto_configure -a
   debian/rules override_dh_auto_build
make[1]: Entering directory `/<<PKGBUILDDIR>>'
/usr/bin/make -C mozilla/security/nss \
		build_coreconf \
		build_dbm \
		all \
		MOZILLA_CLIENT=1 \
		NSPR_INCLUDE_DIR=/usr/include/nspr \
		NSPR_LIB_DIR=/usr/lib \
		SOURCE_MD_DIR=/<<PKGBUILDDIR>>/mozilla/dist \
		DIST=/<<PKGBUILDDIR>>/mozilla/dist \
		BUILD_OPT=1 \
		NS_USE_GCC=1 \
		OPTIMIZER="-g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2" \
		LDFLAGS='-Wl,-z,relro $(ARCHFLAG) $(ZDEFS_FLAG)' \
		DSO_LDOPTS='-shared $(LDFLAGS)' \
		NSS_USE_SYSTEM_SQLITE=1 \
		NSS_ENABLE_ECC=1 \
		CHECKLOC= \
		
make[2]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss'
/usr/bin/make -C ../coreconf
make[3]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/coreconf'
cd nsinstall; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/coreconf/nsinstall'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/coreconf/nsinstall'
cd nsinstall; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/coreconf/nsinstall'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf  nsinstall.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pathsub.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf  pathsub.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf  Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pathsub.o -Wl,-z,relro  -Wl,-z,defs   -lpthread  -ldl -lc
true -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/coreconf/nsinstall'
make[3]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/coreconf'
/usr/bin/make -C ../dbm export libs
make[3]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/dbm'
cd include; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/dbm/include'
Creating ../../../dist/public/dbm
../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ../../../dbm/include/cdefs.h ../../../dbm/include/mcom_db.h ../../../dbm/include/ncompat.h ../../../dbm/include/winfile.h ../../../dist/public/dbm
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/dbm/include'
cd src; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/dbm/src'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/dbm/src'
cd include; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/dbm/include'
make[4]: Nothing to be done for `libs'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/dbm/include'
cd src; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/dbm/src'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/db.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE  -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include  ../../../dbm/src/db.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/h_bigkey.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE  -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include  ../../../dbm/src/h_bigkey.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/h_func.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE  -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include  ../../../dbm/src/h_func.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/h_log2.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE  -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include  ../../../dbm/src/h_log2.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/h_page.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE  -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include  ../../../dbm/src/h_page.c
../../../dbm/src/h_page.c: In function 'overflow_page':
../../../dbm/src/h_page.c:1002:4: warning: ignoring return value of 'write', declared with attribute warn_unused_result [-Wunused-result]
../../../dbm/src/h_page.c:1017:4: warning: ignoring return value of 'write', declared with attribute warn_unused_result [-Wunused-result]
../../../dbm/src/h_page.c:1043:5: warning: ignoring return value of 'write', declared with attribute warn_unused_result [-Wunused-result]
../../../dbm/src/h_page.c: In function 'new_lseek':
../../../dbm/src/h_page.c:165:15: warning: ignoring return value of 'write', declared with attribute warn_unused_result [-Wunused-result]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/hash.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE  -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include  ../../../dbm/src/hash.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/hash_buf.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE  -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include  ../../../dbm/src/hash_buf.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/mktemp.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE  -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include  ../../../dbm/src/mktemp.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/dirent.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE  -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include  dirent.c
rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libdbm.a
ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libdbm.a Linux3.19_arm_glibc_PTH_OPT.OBJ/db.o Linux3.19_arm_glibc_PTH_OPT.OBJ/h_bigkey.o Linux3.19_arm_glibc_PTH_OPT.OBJ/h_func.o Linux3.19_arm_glibc_PTH_OPT.OBJ/h_log2.o Linux3.19_arm_glibc_PTH_OPT.OBJ/h_page.o Linux3.19_arm_glibc_PTH_OPT.OBJ/hash.o Linux3.19_arm_glibc_PTH_OPT.OBJ/hash_buf.o Linux3.19_arm_glibc_PTH_OPT.OBJ/mktemp.o Linux3.19_arm_glibc_PTH_OPT.OBJ/dirent.o
ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libdbm.a
../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libdbm.a /<<PKGBUILDDIR>>/mozilla/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/dbm/src'
make[3]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/dbm'
cd lib; /usr/bin/make export
make[3]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib'
cd util; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/util'
Creating ../../../../dist/public/nss
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 base64.h ciferfam.h hasht.h nssb64.h nssb64t.h nsslocks.h nssilock.h nssilckt.h nssrwlk.h nssrwlkt.h nssutil.h pkcs11.h pkcs11f.h pkcs11p.h pkcs11t.h pkcs11n.h pkcs11u.h pkcs1sig.h portreg.h secasn1.h secasn1t.h seccomon.h secder.h secdert.h secdig.h secdigt.h secitem.h secoid.h secoidt.h secport.h secerr.h utilmodt.h utilrename.h utilpars.h utilparst.h ../../../../dist/public/nss
Creating ../../../../dist/private/nss
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 templates.c ../../../../dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/util'
cd freebl; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/freebl'
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 blapit.h shsign.h ecl/ecl-exp.h nsslowhash.h ../../../../dist/public/nss
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 alghmac.h blapi.h hmacct.h secmpi.h secrng.h ec.h ecl/ecl.h ecl/ecl-curve.h ../../../../dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/freebl'
cd softoken; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/softoken'
cd legacydb; /usr/bin/make export
make[5]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/softoken/legacydb'
There are no private exports.
make[5]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/softoken/legacydb'
cd legacydb; /usr/bin/make private_export
make[5]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/softoken/legacydb'
There are no private exports.
make[5]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/softoken/legacydb'
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 lgglue.h lowkeyi.h lowkeyti.h pkcs11ni.h softoken.h softoknt.h softkver.h sdb.h sftkdbt.h ../../../../dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/softoken'
cd base; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/base'
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssbaset.h nssbase.h ../../../../dist/public/nss
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 baset.h base.h ../../../../dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/base'
cd dev; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/dev'
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ckhelper.h devm.h devtm.h devt.h dev.h nssdevt.h nssdev.h ../../../../dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/dev'
cd pki; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/pki'
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pki.h pkit.h nsspkit.h nsspki.h pkistore.h pki3hack.h pkitm.h pkim.h ../../../../dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/pki'
cd libpkix; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix'
cd include; /usr/bin/make export
make[5]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/include'
../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix.h pkix_crlsel.h pkix_errorstrings.h pkix_results.h pkixt.h pkix_certsel.h pkix_params.h pkix_revchecker.h pkix_certstore.h pkix_pl_pki.h pkix_sample_modules.h pkix_checker.h pkix_pl_system.h pkix_util.h ../../../../../dist/private/nss
make[5]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/include'
cd pkix; /usr/bin/make export
make[5]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix'
cd certsel; /usr/bin/make export
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/certsel'
../../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../../dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/certsel'
cd crlsel; /usr/bin/make export
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/crlsel'
../../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../../dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/crlsel'
cd checker; /usr/bin/make export
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/checker'
../../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../../dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/checker'
cd params; /usr/bin/make export
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/params'
../../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../../dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/params'
cd results; /usr/bin/make export
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/results'
../../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../../dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/results'
cd store; /usr/bin/make export
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/store'
../../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../../dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/store'
cd top; /usr/bin/make export
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/top'
../../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../../dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/top'
cd util; /usr/bin/make export
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/util'
../../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../../dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/util'
cd certsel; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/certsel'
../../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../../dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/certsel'
cd crlsel; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/crlsel'
../../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../../dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/crlsel'
cd checker; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/checker'
../../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../../dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/checker'
cd params; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/params'
../../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../../dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/params'
cd results; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/results'
../../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../../dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/results'
cd store; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/store'
../../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../../dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/store'
cd top; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/top'
../../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../../dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/top'
cd util; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/util'
../../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../../dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/util'
There are no private exports.
make[5]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix'
cd pkix_pl_nss; /usr/bin/make export
make[5]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix_pl_nss'
cd pki; /usr/bin/make export
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki'
../../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../../dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki'
cd system; /usr/bin/make export
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system'
../../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../../dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system'
cd module; /usr/bin/make export
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module'
../../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../../dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module'
cd pki; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki'
../../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../../dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki'
cd system; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system'
../../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../../dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system'
cd module; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module'
../../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../../dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module'
There are no private exports.
make[5]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix_pl_nss'
cd include; /usr/bin/make private_export
make[5]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/include'
../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix.h pkix_crlsel.h pkix_errorstrings.h pkix_results.h pkixt.h pkix_certsel.h pkix_params.h pkix_revchecker.h pkix_certstore.h pkix_pl_pki.h pkix_sample_modules.h pkix_checker.h pkix_pl_system.h pkix_util.h ../../../../../dist/private/nss
make[5]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/include'
cd pkix; /usr/bin/make private_export
make[5]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix'
cd certsel; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/certsel'
../../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../../dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/certsel'
cd crlsel; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/crlsel'
../../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../../dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/crlsel'
cd checker; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/checker'
../../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../../dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/checker'
cd params; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/params'
../../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../../dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/params'
cd results; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/results'
../../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../../dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/results'
cd store; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/store'
../../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../../dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/store'
cd top; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/top'
../../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../../dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/top'
cd util; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/util'
../../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../../dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/util'
There are no private exports.
make[5]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix'
cd pkix_pl_nss; /usr/bin/make private_export
make[5]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix_pl_nss'
cd pki; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki'
../../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../../dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki'
cd system; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system'
../../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../../dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system'
cd module; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module'
../../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../../dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module'
There are no private exports.
make[5]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix_pl_nss'
There are no private exports.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix'
cd certdb; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/certdb'
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cert.h certt.h certdb.h ../../../../dist/public/nss
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 genname.h xconst.h certxutl.h certi.h ../../../../dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/certdb'
cd certhigh; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/certhigh'
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ocsp.h ocspt.h ../../../../dist/public/nss
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ocspti.h ocspi.h ../../../../dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/certhigh'
cd pk11wrap; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/pk11wrap'
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmod.h secmodt.h secpkcs5.h pk11func.h pk11pub.h pk11priv.h pk11sdr.h pk11pqg.h ../../../../dist/public/nss
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmodi.h dev3hack.h ../../../../dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/pk11wrap'
cd cryptohi; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/cryptohi'
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cryptohi.h cryptoht.h key.h keyhi.h keyt.h keythi.h sechash.h ../../../../dist/public/nss
There are no private exports.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/cryptohi'
cd nss; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/nss'
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nss.h ../../../../dist/public/nss
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssrenam.h ../../../../dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/nss'
cd ssl; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/ssl'
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ssl.h sslt.h sslerr.h sslproto.h preenc.h ../../../../dist/public/nss
There are no private exports.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/ssl'
cd pkcs12; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/pkcs12'
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkcs12t.h pkcs12.h p12plcy.h p12.h p12t.h ../../../../dist/public/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/pkcs12'
cd pkcs7; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/pkcs7'
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmime.h secpkcs7.h pkcs7t.h ../../../../dist/public/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/pkcs7'
cd smime; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/smime'
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cms.h cmst.h smime.h cmsreclist.h ../../../../dist/public/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/smime'
cd crmf; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/crmf'
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 crmf.h crmft.h cmmf.h cmmft.h ../../../../dist/public/nss
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 crmfi.h crmfit.h cmmfi.h cmmfit.h ../../../../dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/crmf'
cd jar; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/jar'
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 jar.h jar-ds.h jarfile.h ../../../../dist/public/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/jar'
cd ckfw; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/ckfw'
cd builtins; /usr/bin/make export
make[5]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/ckfw/builtins'
../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssckbi.h ../../../../../dist/public/nss
make[5]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/ckfw/builtins'
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssck.api nssckepv.h nssckft.h nssckfw.h nssckfwc.h nssckfwt.h nssckg.h nssckmdt.h nssckt.h ../../../../dist/public/nss
cd builtins; /usr/bin/make private_export
make[5]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/ckfw/builtins'
There are no private exports.
make[5]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/ckfw/builtins'
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ck.h ckfw.h ckfwm.h ckfwtm.h ckmd.h ckt.h ../../../../dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/ckfw'
make[3]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib'
cd cmd; /usr/bin/make export
make[3]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd'
cd lib; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/lib'
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 basicutil.h secutil.h pk11table.h ../../../../dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/lib'
cd addbuiltin; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/addbuiltin'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/addbuiltin'
cd atob; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/atob'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/atob'
cd bltest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/bltest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/bltest'
cd btoa; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/btoa'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/btoa'
cd certcgi; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/certcgi'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/certcgi'
cd certutil; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/certutil'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/certutil'
cd checkcert; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/checkcert'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/checkcert'
cd chktest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/chktest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/chktest'
cd crlutil; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/crlutil'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/crlutil'
cd crmftest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/crmftest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/crmftest'
cd dbtest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/dbtest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/dbtest'
cd derdump; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/derdump'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/derdump'
cd digest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/digest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/digest'
cd httpserv; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/httpserv'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/httpserv'
cd fipstest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/fipstest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/fipstest'
cd lowhashtest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/lowhashtest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/lowhashtest'
cd listsuites; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/listsuites'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/listsuites'
cd makepqg; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/makepqg'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/makepqg'
cd multinit; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/multinit'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/multinit'
cd ocspclnt; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/ocspclnt'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/ocspclnt'
cd ocspresp; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/ocspresp'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/ocspresp'
cd oidcalc; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/oidcalc'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/oidcalc'
cd p7content; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/p7content'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/p7content'
cd p7env; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/p7env'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/p7env'
cd p7sign; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/p7sign'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/p7sign'
cd p7verify; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/p7verify'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/p7verify'
cd pk12util; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/pk12util'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/pk12util'
cd pk11mode; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/pk11mode'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/pk11mode'
cd pk1sign; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/pk1sign'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/pk1sign'
cd pkix-errcodes; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/pkix-errcodes'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/pkix-errcodes'
cd pp; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/pp'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/pp'
cd pwdecrypt; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/pwdecrypt'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/pwdecrypt'
cd rsaperf; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/rsaperf'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/rsaperf'
cd sdrtest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/sdrtest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/sdrtest'
cd selfserv; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/selfserv'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/selfserv'
cd signtool; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/signtool'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/signtool'
cd signver; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/signver'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/signver'
cd shlibsign; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/shlibsign'
cd mangle; /usr/bin/make export
make[5]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/shlibsign/mangle'
make[5]: Nothing to be done for `export'.
make[5]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/shlibsign/mangle'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/shlibsign'
cd smimetools; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/smimetools'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/smimetools'
cd ssltap; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/ssltap'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/ssltap'
cd strsclnt; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/strsclnt'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/strsclnt'
cd symkeyutil; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/symkeyutil'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/symkeyutil'
cd tests; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/tests'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/tests'
cd tstclnt; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/tstclnt'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/tstclnt'
cd vfychain; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/vfychain'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/vfychain'
cd vfyserv; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/vfyserv'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/vfyserv'
cd modutil; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/modutil'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/modutil'
make[3]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd'
cd lib; /usr/bin/make libs
make[3]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib'
cd util; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/util'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/quickder.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  quickder.c
quickder.c: In function 'DecodeItem':
quickder.c:666:12: warning: variable 'optional' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/secdig.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secdig.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/derdec.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  derdec.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/derenc.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  derenc.c
derenc.c: In function 'der_encode':
derenc.c:282:22: warning: variable 'optional' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/dersubr.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  dersubr.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/dertime.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  dertime.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/errstrs.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  errstrs.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/nssb64d.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  nssb64d.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/nssb64e.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  nssb64e.c
nssb64e.c: In function 'NSSBase64_EncodeItem_Util':
nssb64e.c:686:15: warning: 'out_len' may be used uninitialized in this function [-Wuninitialized]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/nssrwlk.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  nssrwlk.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/nssilock.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  nssilock.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/oidstring.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  oidstring.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkcs1sig.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pkcs1sig.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/portreg.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  portreg.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/secalgid.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secalgid.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/secasn1d.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secasn1d.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/secasn1e.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secasn1e.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/secasn1u.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secasn1u.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/secitem.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secitem.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/secload.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secload.c
secload.c: In function 'loader_LoadLibInReferenceDir':
secload.c:75:11: warning: assignment discards 'const' qualifier from pointer target type [enabled by default]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/secoid.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secoid.c
secoid.c: In function 'SECOID_Init':
secoid.c:1919:19: warning: variable 'c' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sectime.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sectime.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/secport.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secport.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/templates.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  templates.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/utf8.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  utf8.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/utilmod.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  utilmod.c
utilmod.c: In function 'nssutil_DeleteSecmodDB.isra.1':
utilmod.c:504:5: warning: 'lib_len' may be used uninitialized in this function [-Wuninitialized]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/utilpars.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  utilpars.c
rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssutil.a
ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssutil.a Linux3.19_arm_glibc_PTH_OPT.OBJ/quickder.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secdig.o Linux3.19_arm_glibc_PTH_OPT.OBJ/derdec.o Linux3.19_arm_glibc_PTH_OPT.OBJ/derenc.o Linux3.19_arm_glibc_PTH_OPT.OBJ/dersubr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/dertime.o Linux3.19_arm_glibc_PTH_OPT.OBJ/errstrs.o Linux3.19_arm_glibc_PTH_OPT.OBJ/nssb64d.o Linux3.19_arm_glibc_PTH_OPT.OBJ/nssb64e.o Linux3.19_arm_glibc_PTH_OPT.OBJ/nssrwlk.o Linux3.19_arm_glibc_PTH_OPT.OBJ/nssilock.o Linux3.19_arm_glibc_PTH_OPT.OBJ/oidstring.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkcs1sig.o Linux3.19_arm_glibc_PTH_OPT.OBJ/portreg.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secalgid.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secasn1d.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secasn1e.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secasn1u.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secitem.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secload.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secoid.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sectime.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secport.o Linux3.19_arm_glibc_PTH_OPT.OBJ/templates.o Linux3.19_arm_glibc_PTH_OPT.OBJ/utf8.o Linux3.19_arm_glibc_PTH_OPT.OBJ/utilmod.o Linux3.19_arm_glibc_PTH_OPT.OBJ/utilpars.o
ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssutil.a
grep -v ';-' nssutil.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.19_arm_glibc_PTH_OPT.OBJ/nssutil.def
rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssutil3.so
gcc -shared -Wl,-z,relro  -Wl,-z,defs -Wl,-soname -Wl,libnssutil3.so  -Wl,--version-script,Linux3.19_arm_glibc_PTH_OPT.OBJ/nssutil.def -o Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssutil3.so Linux3.19_arm_glibc_PTH_OPT.OBJ/quickder.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secdig.o Linux3.19_arm_glibc_PTH_OPT.OBJ/derdec.o Linux3.19_arm_glibc_PTH_OPT.OBJ/derenc.o Linux3.19_arm_glibc_PTH_OPT.OBJ/dersubr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/dertime.o Linux3.19_arm_glibc_PTH_OPT.OBJ/errstrs.o Linux3.19_arm_glibc_PTH_OPT.OBJ/nssb64d.o Linux3.19_arm_glibc_PTH_OPT.OBJ/nssb64e.o Linux3.19_arm_glibc_PTH_OPT.OBJ/nssrwlk.o Linux3.19_arm_glibc_PTH_OPT.OBJ/nssilock.o Linux3.19_arm_glibc_PTH_OPT.OBJ/oidstring.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkcs1sig.o Linux3.19_arm_glibc_PTH_OPT.OBJ/portreg.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secalgid.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secasn1d.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secasn1e.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secasn1u.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secitem.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secload.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secoid.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sectime.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secport.o Linux3.19_arm_glibc_PTH_OPT.OBJ/templates.o Linux3.19_arm_glibc_PTH_OPT.OBJ/utf8.o Linux3.19_arm_glibc_PTH_OPT.OBJ/utilmod.o Linux3.19_arm_glibc_PTH_OPT.OBJ/utilpars.o    -L/<<PKGBUILDDIR>>/mozilla/dist/lib -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
chmod +x Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssutil3.so
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssutil.a /<<PKGBUILDDIR>>/mozilla/dist/lib
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssutil3.so /<<PKGBUILDDIR>>/mozilla/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/util'
cd freebl; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/freebl'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/loader.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  loader.c
loader.c: In function 'freebl_LoadDSO':
loader.c:133:14: warning: variable 'status' set but not used [-Wunused-but-set-variable]
loader.c: In function 'BL_Unload':
loader.c:902:20: warning: unused variable 'status' [-Wunused-variable]
rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libfreebl.a
ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libfreebl.a Linux3.19_arm_glibc_PTH_OPT.OBJ/loader.o
ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libfreebl.a
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libfreebl.a /<<PKGBUILDDIR>>/mozilla/dist/lib
mkdir Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB
/usr/bin/make FREEBL_CHILD_BUILD=1 \
 OBJDIR=Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB libs
make[5]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/freebl'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/freeblver.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  freeblver.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ldvector.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ldvector.c
ldvector.c: In function 'FREEBL_GetVector':
ldvector.c:279:19: warning: variable 'c' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sysrand.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  sysrand.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sha_fast.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  sha_fast.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/md2.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  md2.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/md5.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  md5.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sha512.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  sha512.c
sha512.c: In function 'SHA512_Compress':
sha512.c:934:14: warning: unused variable 't1' [-Wunused-variable]
sha512.c:956:18: warning: unused variable 't2' [-Wunused-variable]
sha512.c:956:14: warning: unused variable 't1' [-Wunused-variable]
sha512.c: In function 'SHA512_End':
sha512.c:1230:14: warning: unused variable 't1' [-Wunused-variable]
sha512.c: In function 'SHA512_EndRaw':
sha512.c:1275:14: warning: unused variable 't1' [-Wunused-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/alghmac.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  alghmac.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rawhash.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  rawhash.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/alg2268.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  alg2268.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/arcfour.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  arcfour.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/arcfive.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  arcfive.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/desblapi.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  -fno-strict-aliasing desblapi.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/des.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  des.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/drbg.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  drbg.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/cts.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  cts.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ctr.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ctr.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/gcm.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  gcm.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/hmacct.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  hmacct.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rijndael.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  rijndael.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/aeskeywrap.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  aeskeywrap.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/camellia.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  camellia.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/dh.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  dh.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ec.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/pqg.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  pqg.c
pqg.c: In function 'pqg_ParamGen':
pqg.c:1234:19: warning: variable 'b' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/dsa.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  dsa.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rsa.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  rsa.c
rsa.c: In function 'get_blinding_params':
rsa.c:1098:29: warning: variable 'prevbp' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/shvfy.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  shvfy.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/tlsprfalg.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  tlsprfalg.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/seed.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  seed.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/jpake.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  jpake.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpprime.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  mpi/mpprime.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpmontg.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  mpi/mpmontg.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mplogic.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  mpi/mplogic.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpi.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  mpi/mpi.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mp_gf2m.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  mpi/mp_gf2m.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpi_arm.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  mpi/mpi_arm.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpcpucache.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  mpi/mpcpucache.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecl.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_curve.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecl_curve.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_mult.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecl_mult.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_gf.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecl_gf.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_aff.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecp_aff.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_jac.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecp_jac.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_mont.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecp_mont.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec_naf.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ec_naf.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_jm.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecp_jm.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/stubs.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  stubs.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/nsslowhash.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  nsslowhash.c
nsslowhash.c: In function 'NSSLOW_Init':
nsslowhash.c:292:12: warning: variable 'nsprAvailable' set but not used [-Wunused-but-set-variable]
grep -v ';-' freebl_hash.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/freebl.def
rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so
gcc -shared -Wl,-z,relro  -Wl,-z,defs -Wl,-soname -Wl,libfreebl3.so  -Wl,--version-script,Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/freebl.def -Wl,-Bsymbolic -o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/freeblver.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ldvector.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sysrand.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sha_fast.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/md2.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/md5.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sha512.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/alghmac.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rawhash.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/alg2268.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/arcfour.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/arcfive.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/desblapi.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/des.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/drbg.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/cts.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ctr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/gcm.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/hmacct.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rijndael.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/aeskeywrap.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/camellia.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/dh.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/pqg.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/dsa.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rsa.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/shvfy.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/tlsprfalg.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/seed.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/jpake.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpprime.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpmontg.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mplogic.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpi.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mp_gf2m.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpi_arm.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpcpucache.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_curve.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_mult.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_gf.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_aff.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_jac.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_mont.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec_naf.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_jm.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/stubs.o Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/nsslowhash.o      -ldl -lc
chmod +x Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so /<<PKGBUILDDIR>>/mozilla/dist/lib
make[5]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/freebl'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/freebl'
cd softoken; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/softoken'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ecdecode.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  ecdecode.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/fipsaudt.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  fipsaudt.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/fipstest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  fipstest.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/fipstokn.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  fipstokn.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/lgglue.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  lgglue.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/lowkey.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  lowkey.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/lowpbe.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  lowpbe.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/padbuf.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  padbuf.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkcs11.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pkcs11.c
pkcs11.c: In function 'NSC_GetInfo':
pkcs11.c:3073:19: warning: variable 'c' set but not used [-Wunused-but-set-variable]
pkcs11.c: In function 'NSC_CreateObject':
pkcs11.c:4015:21: warning: 'moduleIndex' may be used uninitialized in this function [-Wuninitialized]
pkcs11.c:3935:19: note: 'moduleIndex' was declared here
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkcs11c.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pkcs11c.c
pkcs11c.c: In function 'NSC_SignInit':
pkcs11c.c:2276:25: warning: assignment from incompatible pointer type [enabled by default]
pkcs11c.c:2305:25: warning: assignment from incompatible pointer type [enabled by default]
pkcs11c.c: In function 'NSC_GenerateKeyPair':
pkcs11c.c:3983:11: warning: variable 'private_value_bits' set but not used [-Wunused-but-set-variable]
pkcs11c.c: In function 'sftk_PackagePrivateKey':
pkcs11c.c:4505:14: warning: variable 'fordebug' set but not used [-Wunused-but-set-variable]
pkcs11c.c: At top level:
pkcs11c.c:462:1: warning: 'sftk_EncryptOAEP' defined but not used [-Wunused-function]
pkcs11c.c:471:1: warning: 'sftk_DecryptOAEP' defined but not used [-Wunused-function]
pkcs11c.c: In function 'NSC_GenerateKeyPair':
pkcs11c.c:3903:6: warning: 'subPrimeLen' may be used uninitialized in this function [-Wuninitialized]
pkcs11c.c:3685:14: note: 'subPrimeLen' was declared here
pkcs11c.c:3754:13: warning: 'modulusLen' may be used uninitialized in this function [-Wuninitialized]
pkcs11c.c:3684:14: note: 'modulusLen' was declared here
pkcs11c.c: In function 'NSC_GenerateKey':
pkcs11c.c:3611:13: warning: 'hashType' may be used uninitialized in this function [-Wuninitialized]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkcs11u.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pkcs11u.c
pkcs11u.c: In function 'sftk_DeleteObject':
pkcs11u.c:1177:22: warning: unused variable 'to' [-Wunused-variable]
pkcs11u.c: In function 'sftk_NewTokenObject':
pkcs11u.c:1902:22: warning: variable 'tokObject' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/rsawrapr.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  rsawrapr.c
rsawrapr.c: In function 'constantTimeEQ8':
rsawrapr.c:30:5: warning: suggest parentheses around arithmetic in operand of '|' [-Wparentheses]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sdb.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sdb.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sftkdb.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sftkdb.c
sftkdb.c: In function 'sftkdb_fixupTemplateOut':
sftkdb.c:328:22: warning: variable 'data' set but not used [-Wunused-but-set-variable]
sftkdb.c: In function 'sftkdb_CreateObject':
sftkdb.c:576:12: warning: variable 'inTransaction' set but not used [-Wunused-but-set-variable]
sftkdb.c: In function 'sftkdb_handleIDAndName':
sftkdb.c:2014:11: warning: variable 'crv' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sftkhmac.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sftkhmac.c
sftkhmac.c: In function 'sftk_HMACConstantTime_Update':
sftkhmac.c:149:15: warning: unused variable 'rv' [-Wunused-variable]
sftkhmac.c: In function 'sftk_SSLv3MACConstantTime_Update':
sftkhmac.c:163:15: warning: unused variable 'rv' [-Wunused-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sftkpars.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sftkpars.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sftkpwd.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sftkpwd.c
sftkpwd.c: In function 'sftk_updateMacs':
sftkpwd.c:868:11: warning: variable 'crv2' set but not used [-Wunused-but-set-variable]
sftkpwd.c:867:11: warning: variable 'crv' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/softkver.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  softkver.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/tlsprf.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  tlsprf.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/jpakesftk.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  jpakesftk.c
rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libsoftokn.a
ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libsoftokn.a Linux3.19_arm_glibc_PTH_OPT.OBJ/ecdecode.o Linux3.19_arm_glibc_PTH_OPT.OBJ/fipsaudt.o Linux3.19_arm_glibc_PTH_OPT.OBJ/fipstest.o Linux3.19_arm_glibc_PTH_OPT.OBJ/fipstokn.o Linux3.19_arm_glibc_PTH_OPT.OBJ/lgglue.o Linux3.19_arm_glibc_PTH_OPT.OBJ/lowkey.o Linux3.19_arm_glibc_PTH_OPT.OBJ/lowpbe.o Linux3.19_arm_glibc_PTH_OPT.OBJ/padbuf.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkcs11.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkcs11c.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkcs11u.o Linux3.19_arm_glibc_PTH_OPT.OBJ/rsawrapr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sdb.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sftkdb.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sftkhmac.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sftkpars.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sftkpwd.o Linux3.19_arm_glibc_PTH_OPT.OBJ/softkver.o Linux3.19_arm_glibc_PTH_OPT.OBJ/tlsprf.o Linux3.19_arm_glibc_PTH_OPT.OBJ/jpakesftk.o
ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libsoftokn.a
grep -v ';-' softokn.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.19_arm_glibc_PTH_OPT.OBJ/softokn.def
rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libsoftokn3.so
gcc -shared -Wl,-z,relro  -Wl,-z,defs -Wl,-soname -Wl,libsoftokn3.so  -Wl,--version-script,Linux3.19_arm_glibc_PTH_OPT.OBJ/softokn.def -o Linux3.19_arm_glibc_PTH_OPT.OBJ/libsoftokn3.so Linux3.19_arm_glibc_PTH_OPT.OBJ/ecdecode.o Linux3.19_arm_glibc_PTH_OPT.OBJ/fipsaudt.o Linux3.19_arm_glibc_PTH_OPT.OBJ/fipstest.o Linux3.19_arm_glibc_PTH_OPT.OBJ/fipstokn.o Linux3.19_arm_glibc_PTH_OPT.OBJ/lgglue.o Linux3.19_arm_glibc_PTH_OPT.OBJ/lowkey.o Linux3.19_arm_glibc_PTH_OPT.OBJ/lowpbe.o Linux3.19_arm_glibc_PTH_OPT.OBJ/padbuf.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkcs11.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkcs11c.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkcs11u.o Linux3.19_arm_glibc_PTH_OPT.OBJ/rsawrapr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sdb.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sftkdb.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sftkhmac.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sftkpars.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sftkpwd.o Linux3.19_arm_glibc_PTH_OPT.OBJ/softkver.o Linux3.19_arm_glibc_PTH_OPT.OBJ/tlsprf.o Linux3.19_arm_glibc_PTH_OPT.OBJ/jpakesftk.o   /<<PKGBUILDDIR>>/mozilla/dist/lib/libfreebl.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lsqlite3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
chmod +x Linux3.19_arm_glibc_PTH_OPT.OBJ/libsoftokn3.so
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libsoftokn.a /<<PKGBUILDDIR>>/mozilla/dist/lib
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/libsoftokn3.so /<<PKGBUILDDIR>>/mozilla/dist/lib
cd legacydb; /usr/bin/make libs
make[5]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/softoken/legacydb'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/dbmshim.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  dbmshim.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/keydb.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  keydb.c
keydb.c: In function 'seckey_encrypt_private_key':
keydb.c:1480:14: warning: variable 'fordebug' set but not used [-Wunused-but-set-variable]
keydb.c: In function 'seckey_decrypt_private_key':
keydb.c:1709:14: warning: variable 'fordebug' set but not used [-Wunused-but-set-variable]
keydb.c: In function 'encodePWCheckEntry':
keydb.c:1994:15: warning: variable 'rv' set but not used [-Wunused-but-set-variable]
keydb.c: In function 'nsslowkey_ResetKeyDB':
keydb.c:2036:9: warning: variable 'ret' set but not used [-Wunused-but-set-variable]
keydb.c: In function 'keydb_Get':
keydb.c:2093:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable]
keydb.c: In function 'keydb_Put':
keydb.c:2111:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable]
keydb.c: In function 'keydb_Sync':
keydb.c:2129:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable]
keydb.c: In function 'keydb_Del':
keydb.c:2147:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable]
keydb.c: In function 'keydb_Seq':
keydb.c:2165:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable]
keydb.c: In function 'keydb_Close':
keydb.c:2183:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/lgattr.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  lgattr.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/lgcreate.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  lgcreate.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/lgdestroy.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  lgdestroy.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/lgfind.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  lgfind.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/lginit.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  lginit.c
lginit.c: In function 'legacy_Open':
lginit.c:597:19: warning: variable 'c' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/lgutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  lgutil.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/lowcert.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  lowcert.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/lowkey.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  lowkey.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pcertdb.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  pcertdb.c
pcertdb.c: In function 'nsslowcert_UnlockDB':
pcertdb.c:108:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable]
pcertdb.c: In function 'nsslowcert_UnlockCertRefCount':
pcertdb.c:139:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable]
pcertdb.c: In function 'nsslowcert_UnlockCertTrust':
pcertdb.c:171:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable]
pcertdb.c: In function 'nsslowcert_UnlockFreeList':
pcertdb.c:204:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable]
pcertdb.c: In function 'certdb_Get':
pcertdb.c:229:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable]
pcertdb.c: In function 'certdb_Put':
pcertdb.c:245:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable]
pcertdb.c: In function 'certdb_Sync':
pcertdb.c:261:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable]
pcertdb.c: In function 'certdb_Del':
pcertdb.c:278:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable]
pcertdb.c: In function 'certdb_Seq':
pcertdb.c:299:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable]
pcertdb.c: In function 'certdb_Close':
pcertdb.c:315:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable]
pcertdb.c: In function 'NewDBSubjectEntry':
pcertdb.c:2435:18: warning: variable 'eaddrlen' set but not used [-Wunused-but-set-variable]
pcertdb.c: In function 'UpdateV6DB':
pcertdb.c:3591:15: warning: variable 'rv' set but not used [-Wunused-but-set-variable]
pcertdb.c: In function 'UpdateV5DB':
pcertdb.c:3796:15: warning: variable 'rv' set but not used [-Wunused-but-set-variable]
pcertdb.c: In function 'nsslowcert_FindCrlByKey':
pcertdb.c:5075:9: warning: variable 'key' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11db.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  pk11db.c
rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssdbm.a
ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssdbm.a Linux3.19_arm_glibc_PTH_OPT.OBJ/dbmshim.o Linux3.19_arm_glibc_PTH_OPT.OBJ/keydb.o Linux3.19_arm_glibc_PTH_OPT.OBJ/lgattr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/lgcreate.o Linux3.19_arm_glibc_PTH_OPT.OBJ/lgdestroy.o Linux3.19_arm_glibc_PTH_OPT.OBJ/lgfind.o Linux3.19_arm_glibc_PTH_OPT.OBJ/lginit.o Linux3.19_arm_glibc_PTH_OPT.OBJ/lgutil.o Linux3.19_arm_glibc_PTH_OPT.OBJ/lowcert.o Linux3.19_arm_glibc_PTH_OPT.OBJ/lowkey.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pcertdb.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11db.o
ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssdbm.a
grep -v ';-' nssdbm.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.19_arm_glibc_PTH_OPT.OBJ/nssdbm.def
rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssdbm3.so
gcc -shared -Wl,-z,relro  -Wl,-z,defs -Wl,-soname -Wl,libnssdbm3.so  -Wl,--version-script,Linux3.19_arm_glibc_PTH_OPT.OBJ/nssdbm.def -o Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssdbm3.so Linux3.19_arm_glibc_PTH_OPT.OBJ/dbmshim.o Linux3.19_arm_glibc_PTH_OPT.OBJ/keydb.o Linux3.19_arm_glibc_PTH_OPT.OBJ/lgattr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/lgcreate.o Linux3.19_arm_glibc_PTH_OPT.OBJ/lgdestroy.o Linux3.19_arm_glibc_PTH_OPT.OBJ/lgfind.o Linux3.19_arm_glibc_PTH_OPT.OBJ/lginit.o Linux3.19_arm_glibc_PTH_OPT.OBJ/lgutil.o Linux3.19_arm_glibc_PTH_OPT.OBJ/lowcert.o Linux3.19_arm_glibc_PTH_OPT.OBJ/lowkey.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pcertdb.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11db.o   /<<PKGBUILDDIR>>/mozilla/dist/lib/libfreebl.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libdbm.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
chmod +x Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssdbm3.so
../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssdbm.a /<<PKGBUILDDIR>>/mozilla/dist/lib
../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssdbm3.so /<<PKGBUILDDIR>>/mozilla/dist/lib
make[5]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/softoken/legacydb'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/softoken'
cd base; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/base'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/arena.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  arena.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/error.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  error.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/errorval.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  errorval.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/hashops.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  hashops.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/libc.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  libc.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/tracker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  tracker.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/item.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  item.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/utf8.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  utf8.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/list.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  list.c
list.c: In function 'nssList_Add':
list.c:224:14: warning: variable 'nssrv' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/hash.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  hash.c
rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssb.a
ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssb.a Linux3.19_arm_glibc_PTH_OPT.OBJ/arena.o Linux3.19_arm_glibc_PTH_OPT.OBJ/error.o Linux3.19_arm_glibc_PTH_OPT.OBJ/errorval.o Linux3.19_arm_glibc_PTH_OPT.OBJ/hashops.o Linux3.19_arm_glibc_PTH_OPT.OBJ/libc.o Linux3.19_arm_glibc_PTH_OPT.OBJ/tracker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/item.o Linux3.19_arm_glibc_PTH_OPT.OBJ/utf8.o Linux3.19_arm_glibc_PTH_OPT.OBJ/list.o Linux3.19_arm_glibc_PTH_OPT.OBJ/hash.o
ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssb.a
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssb.a /<<PKGBUILDDIR>>/mozilla/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/base'
cd dev; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/dev'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/devslot.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  devslot.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/devtoken.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  devtoken.c
devtoken.c: In function 'nssToken_TraverseCertificates':
devtoken.c:1473:14: warning: variable 'status' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/devutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  devutil.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ckhelper.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  ckhelper.c
rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssdev.a
ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssdev.a Linux3.19_arm_glibc_PTH_OPT.OBJ/devslot.o Linux3.19_arm_glibc_PTH_OPT.OBJ/devtoken.o Linux3.19_arm_glibc_PTH_OPT.OBJ/devutil.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ckhelper.o
ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssdev.a
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssdev.a /<<PKGBUILDDIR>>/mozilla/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/dev'
cd pki; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/pki'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/asymmkey.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  asymmkey.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certificate.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  certificate.c
certificate.c: In function 'nssCertificateList_DoCallback':
certificate.c:902:14: warning: variable 'nssrv' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cryptocontext.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  cryptocontext.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/symmkey.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  symmkey.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/trustdomain.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  trustdomain.c
trustdomain.c: In function 'NSSTrustDomain_TraverseCertificates':
trustdomain.c:1002:14: warning: variable 'status' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/tdcache.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  tdcache.c
tdcache.c: In function 'merge_object_instances':
tdcache.c:704:49: warning: comparison between 'PRStatus' and 'enum _SECStatus' [-Wenum-compare]
tdcache.c: In function 'add_cert_to_cache':
tdcache.c:776:9: warning: variable 'handle' set but not used [-Wunused-but-set-variable]
tdcache.c: In function 'nssTrustDomain_RemoveCertFromCacheLOCKED':
tdcache.c:276:16: warning: 'nickname' may be used uninitialized in this function [-Wuninitialized]
tdcache.c:336:14: note: 'nickname' was declared here
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certdecode.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  certdecode.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkistore.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  pkistore.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkibase.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  pkibase.c
pkibase.c: In function 'nssPKIObjectCollection_Traverse':
pkibase.c:910:14: warning: variable 'status' set but not used [-Wunused-but-set-variable]
pkibase.c: In function 'nssCertificateCollection_Create':
pkibase.c:1064:14: warning: variable 'status' set but not used [-Wunused-but-set-variable]
pkibase.c: In function 'nssCRLCollection_Create':
pkibase.c:1171:14: warning: variable 'status' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pki3hack.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  pki3hack.c
rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libnsspki.a
ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libnsspki.a Linux3.19_arm_glibc_PTH_OPT.OBJ/asymmkey.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certificate.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cryptocontext.o Linux3.19_arm_glibc_PTH_OPT.OBJ/symmkey.o Linux3.19_arm_glibc_PTH_OPT.OBJ/trustdomain.o Linux3.19_arm_glibc_PTH_OPT.OBJ/tdcache.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certdecode.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkistore.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkibase.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pki3hack.o
ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libnsspki.a
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libnsspki.a /<<PKGBUILDDIR>>/mozilla/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/pki'
cd libpkix; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix'
cd include; /usr/bin/make libs
make[5]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/include'
make[5]: Nothing to be done for `libs'.
make[5]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/include'
cd pkix; /usr/bin/make libs
make[5]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix'
cd certsel; /usr/bin/make libs
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/certsel'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_certselector.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_certselector.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_comcertselparams.c
rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixcertsel.a
ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixcertsel.a Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_certselector.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o
ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixcertsel.a
../../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixcertsel.a /<<PKGBUILDDIR>>/mozilla/dist/lib
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/certsel'
cd crlsel; /usr/bin/make libs
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/crlsel'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_crlselector.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_crlselector.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_comcrlselparams.c
rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixcrlsel.a
ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixcrlsel.a Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_crlselector.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o
ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixcrlsel.a
../../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixcrlsel.a /<<PKGBUILDDIR>>/mozilla/dist/lib
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/crlsel'
cd checker; /usr/bin/make libs
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/checker'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_basicconstraintschecker.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_certchainchecker.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_crlchecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_crlchecker.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_ekuchecker.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_expirationchecker.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_namechainingchecker.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_nameconstraintschecker.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_ocspchecker.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_revocationmethod.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_revocationchecker.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_policychecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_policychecker.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_signaturechecker.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_targetcertchecker.c
rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixchecker.a
ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixchecker.a Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_crlchecker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_policychecker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o
ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixchecker.a
../../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixchecker.a /<<PKGBUILDDIR>>/mozilla/dist/lib
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/checker'
cd params; /usr/bin/make libs
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/params'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_trustanchor.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_trustanchor.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_procparams.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_procparams.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_valparams.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_valparams.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_resourcelimits.c
rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixparams.a
ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixparams.a Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_trustanchor.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_procparams.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_valparams.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o
ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixparams.a
../../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixparams.a /<<PKGBUILDDIR>>/mozilla/dist/lib
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/params'
cd results; /usr/bin/make libs
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/results'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_buildresult.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_buildresult.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_policynode.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_policynode.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_valresult.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_valresult.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_verifynode.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_verifynode.c
rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixresults.a
ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixresults.a Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_buildresult.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_policynode.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_valresult.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_verifynode.o
ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixresults.a
../../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixresults.a /<<PKGBUILDDIR>>/mozilla/dist/lib
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/results'
cd store; /usr/bin/make libs
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/store'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_store.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_store.c
rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixstore.a
ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixstore.a Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_store.o
ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixstore.a
../../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixstore.a /<<PKGBUILDDIR>>/mozilla/dist/lib
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/store'
cd top; /usr/bin/make libs
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/top'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_validate.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_validate.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_lifecycle.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_lifecycle.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_build.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_build.c
rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixtop.a
ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixtop.a Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_validate.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_lifecycle.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_build.o
ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixtop.a
../../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixtop.a /<<PKGBUILDDIR>>/mozilla/dist/lib
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/top'
cd util; /usr/bin/make libs
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/util'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_tools.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_tools.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_error.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_error.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_logger.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_logger.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_list.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_list.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_errpaths.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_errpaths.c
rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixutil.a
ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixutil.a Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_tools.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_error.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_logger.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_list.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_errpaths.o
ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixutil.a
../../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixutil.a /<<PKGBUILDDIR>>/mozilla/dist/lib
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix/util'
make[5]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix'
cd pkix_pl_nss; /usr/bin/make libs
make[5]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix_pl_nss'
cd pki; /usr/bin/make libs
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_basicconstraints.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_cert.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_cert.c
pkix_pl_cert.c: In function 'PKIX_PL_Cert_Create':
pkix_pl_cert.c:1518:22: warning: variable 'copyDER' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_certpolicyinfo.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_certpolicymap.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_certpolicyqualifier.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_crl.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_crl.c
pkix_pl_crl.c: In function 'pkix_pl_CRL_ToString':
pkix_pl_crl.c:455:9: warning: 'crlVersion' may be used uninitialized in this function [-Wuninitialized]
pkix_pl_crl.c:354:21: note: 'crlVersion' was declared here
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_crldp.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_crlentry.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_date.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_date.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_generalname.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_infoaccess.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_nameconstraints.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_ocsprequest.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_ocspresponse.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_publickey.c
pkix_pl_publickey.c: In function 'pkix_pl_PublicKey_Hashcode':
pkix_pl_publickey.c:214:21: warning: variable 'fullHash' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_x500name.c
pkix_pl_x500name.c:37:1: warning: 'pkix_pl_X500Name_ToString_Helper' defined but not used [-Wunused-function]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_ocspcertid.c
rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixpki.a
ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixpki.a Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_cert.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_crl.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_date.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o
ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixpki.a
../../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixpki.a /<<PKGBUILDDIR>>/mozilla/dist/lib
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki'
cd system; /usr/bin/make libs
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_bigint.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_bytearray.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_common.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_common.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_error.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_error.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_hashtable.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_lifecycle.c
pkix_pl_lifecycle.c: In function 'PKIX_PL_Shutdown':
pkix_pl_lifecycle.c:246:21: warning: variable 'numLeakedObjects' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_mem.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_mem.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_monitorlock.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_mutex.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_object.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_object.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_oid.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_oid.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_primhash.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_rwlock.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_string.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_string.c
rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixsystem.a
ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixsystem.a Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_common.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_error.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_mem.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_object.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_oid.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_string.o
ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixsystem.a
../../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixsystem.a /<<PKGBUILDDIR>>/mozilla/dist/lib
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system'
cd module; /usr/bin/make libs
make[6]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_aiamgr.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_colcertstore.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_httpcertstore.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_httpdefaultclient.c
pkix_pl_httpdefaultclient.c: In function 'pkix_pl_HttpDefaultClient_KeepAliveSession':
pkix_pl_httpdefaultclient.c:1135:36: warning: variable 'client' set but not used [-Wunused-but-set-variable]
pkix_pl_httpdefaultclient.c: In function 'pkix_pl_HttpDefaultClient_Cancel':
pkix_pl_httpdefaultclient.c:1487:36: warning: variable 'client' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_ldaptemplates.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_ldapcertstore.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_ldapresponse.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_ldaprequest.c
pkix_pl_ldaprequest.c: In function 'pkix_pl_LdapRequest_Destroy':
pkix_pl_ldaprequest.c:266:30: warning: variable 'ldapRq' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_ldapdefaultclient.c
pkix_pl_ldapdefaultclient.c: In function 'pkix_pl_LdapDefaultClient_VerifyBindResponse':
pkix_pl_ldapdefaultclient.c:371:21: warning: 'msg.protocolOp.op.bindResponseMsg.resultCode.data' may be used uninitialized in this function [-Wuninitialized]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_nsscontext.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_pk11certstore.c
pkix_pl_pk11certstore.c: In function 'NameCacheHasFetchedCrlInfo':
pkix_pl_pk11certstore.c:382:22: warning: variable 'cert' set but not used [-Wunused-but-set-variable]
pkix_pl_pk11certstore.c: In function 'DownloadCrl':
pkix_pl_pk11certstore.c:782:16: warning: variable 'savedError' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_socket.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_socket.c
rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixmodule.a
ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixmodule.a Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_socket.o
ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixmodule.a
../../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixmodule.a /<<PKGBUILDDIR>>/mozilla/dist/lib
make[6]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module'
make[5]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix/pkix_pl_nss'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/libpkix'
cd certdb; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/certdb'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/alg1485.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  alg1485.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certdb.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  certdb.c
certdb.c: In function 'cert_VerifySubjectAltName':
certdb.c:1429:23: warning: variable 'hnLen' set but not used [-Wunused-but-set-variable]
certdb.c: In function 'CERT_ImportCerts':
certdb.c:2441:15: warning: variable 'rv' set but not used [-Wunused-but-set-variable]
certdb.c: In function 'CERT_UnlockCertRefCount':
certdb.c:2891:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable]
certdb.c: In function 'CERT_UnlockCertTrust':
certdb.c:2971:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certv3.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  certv3.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certxutl.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  certxutl.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/crl.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  crl.c
crl.c: In function 'crl_storeCRL':
crl.c:632:15: warning: variable 'rv' set but not used [-Wunused-but-set-variable]
crl.c: In function 'cert_CheckCertRevocationStatus':
crl.c:2634:25: warning: comparison between 'enum _SECStatus' and 'SECCertTimeValidity' [-Wenum-compare]
crl.c:2690:27: warning: unused variable 'rv2' [-Wunused-variable]
crl.c: In function 'cert_CacheCRLByGeneralName':
crl.c:3047:32: warning: variable 'rv2' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/genname.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  genname.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/stanpcertdb.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  stanpcertdb.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/polcyxtn.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  polcyxtn.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/secname.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secname.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/xauthkid.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  xauthkid.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/xbsconst.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  xbsconst.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/xconst.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  xconst.c
rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libcertdb.a
ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libcertdb.a Linux3.19_arm_glibc_PTH_OPT.OBJ/alg1485.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certdb.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certv3.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certxutl.o Linux3.19_arm_glibc_PTH_OPT.OBJ/crl.o Linux3.19_arm_glibc_PTH_OPT.OBJ/genname.o Linux3.19_arm_glibc_PTH_OPT.OBJ/stanpcertdb.o Linux3.19_arm_glibc_PTH_OPT.OBJ/polcyxtn.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secname.o Linux3.19_arm_glibc_PTH_OPT.OBJ/xauthkid.o Linux3.19_arm_glibc_PTH_OPT.OBJ/xbsconst.o Linux3.19_arm_glibc_PTH_OPT.OBJ/xconst.o
ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libcertdb.a
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libcertdb.a /<<PKGBUILDDIR>>/mozilla/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/certdb'
cd certhigh; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/certhigh'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certhtml.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  certhtml.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certreq.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  certreq.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/crlv2.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  crlv2.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ocsp.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  ocsp.c
ocsp.c: In function 'ocsp_RemoveCacheItem':
ocsp.c:564:12: warning: variable 'couldRemoveFromHashTable' set but not used [-Wunused-but-set-variable]
ocsp.c: In function 'CERT_EncodeOCSPRequest':
ocsp.c:1437:21: warning: variable 'tbsRequest' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ocspsig.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  ocspsig.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certhigh.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  certhigh.c
certhigh.c: In function 'CERT_MatchNickname':
certhigh.c:28:9: warning: variable 'len' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certvfy.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  certvfy.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certvfypkix.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  certvfypkix.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certvfypkixprint.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  certvfypkixprint.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/xcrldist.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  xcrldist.c
rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libcerthi.a
ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libcerthi.a Linux3.19_arm_glibc_PTH_OPT.OBJ/certhtml.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certreq.o Linux3.19_arm_glibc_PTH_OPT.OBJ/crlv2.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ocsp.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ocspsig.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certhigh.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certvfy.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certvfypkix.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certvfypkixprint.o Linux3.19_arm_glibc_PTH_OPT.OBJ/xcrldist.o
ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libcerthi.a
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libcerthi.a /<<PKGBUILDDIR>>/mozilla/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/certhigh'
cd pk11wrap; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/pk11wrap'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/dev3hack.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  dev3hack.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11akey.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11akey.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11auth.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11auth.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11cert.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11cert.c
pk11cert.c: In function 'pk11_fastCert':
pk11cert.c:231:14: warning: variable 'status' set but not used [-Wunused-but-set-variable]
pk11cert.c: In function 'PK11_MakeCertFromHandle':
pk11cert.c:297:12: warning: variable 'swapNickname' set but not used [-Wunused-but-set-variable]
pk11cert.c:296:12: warning: variable 'isFortezzaRootCA' set but not used [-Wunused-but-set-variable]
pk11cert.c: In function 'PK11_TraverseCertsForNicknameInSlot':
pk11cert.c:2014:28: warning: variable 'pk11cb' set but not used [-Wunused-but-set-variable]
pk11cert.c: In function 'PK11_FindCertFromDERCertItem':
pk11cert.c:2158:21: warning: unused variable 'td' [-Wunused-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11cxt.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11cxt.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11err.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11err.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11kea.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11kea.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11list.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11list.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11load.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11load.c
pk11load.c: In function 'SECMOD_UnloadModule':
pk11load.c:576:28: warning: unused variable 'status' [-Wunused-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11mech.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11mech.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11merge.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11merge.c
pk11merge.c: In function 'pk11_mergeByObjectIDs':
pk11merge.c:852:15: warning: 'error' may be used uninitialized in this function [-Wuninitialized]
pk11merge.c:753:9: note: 'error' was declared here
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11nobj.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11nobj.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11obj.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11obj.c
pk11obj.c: In function 'PK11_MatchItem':
pk11obj.c:1649:22: warning: variable 'parent' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11pars.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11pars.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11pbe.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11pbe.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11pk12.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11pk12.c
pk11pk12.c: In function 'PK11_ImportPrivateKeyInfoAndReturnKey':
pk11pk12.c:428:17: warning: variable 'keyType' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11pqg.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11pqg.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11sdr.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11sdr.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11skey.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11skey.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11slot.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11slot.c
pk11slot.c: In function 'PK11_InitToken':
pk11slot.c:1101:11: warning: variable 'tmp' set but not used [-Wunused-but-set-variable]
pk11slot.c: In function 'PK11_InitSlot':
pk11slot.c:1345:11: warning: variable 'tmp' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11util.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11util.c
rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libpk11wrap.a
ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libpk11wrap.a Linux3.19_arm_glibc_PTH_OPT.OBJ/dev3hack.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11akey.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11auth.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11cert.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11cxt.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11err.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11kea.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11list.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11load.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11mech.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11merge.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11nobj.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11obj.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11pars.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11pbe.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11pk12.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11pqg.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11sdr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11skey.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11slot.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11util.o
ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libpk11wrap.a
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libpk11wrap.a /<<PKGBUILDDIR>>/mozilla/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/pk11wrap'
cd cryptohi; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/cryptohi'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sechash.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sechash.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/seckey.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  seckey.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/secsign.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secsign.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/secvfy.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secvfy.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/dsautil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  dsautil.c
rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libcryptohi.a
ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libcryptohi.a Linux3.19_arm_glibc_PTH_OPT.OBJ/sechash.o Linux3.19_arm_glibc_PTH_OPT.OBJ/seckey.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secsign.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secvfy.o Linux3.19_arm_glibc_PTH_OPT.OBJ/dsautil.o
ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libcryptohi.a
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libcryptohi.a /<<PKGBUILDDIR>>/mozilla/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/cryptohi'
cd nss; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/nss'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/nssinit.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  nssinit.c
nssinit.c: In function 'NSS_VersionCheck':
nssinit.c:1251:19: warning: variable 'c' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/nssver.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  nssver.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/utilwrap.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  utilwrap.c
rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libnss.a
ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libnss.a Linux3.19_arm_glibc_PTH_OPT.OBJ/nssinit.o Linux3.19_arm_glibc_PTH_OPT.OBJ/nssver.o Linux3.19_arm_glibc_PTH_OPT.OBJ/utilwrap.o
ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libnss.a
grep -v ';-' nss.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.19_arm_glibc_PTH_OPT.OBJ/nss.def
rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libnss3.so
gcc -shared -Wl,-z,relro  -Wl,-z,defs -Wl,-soname -Wl,libnss3.so  -Wl,--version-script,Linux3.19_arm_glibc_PTH_OPT.OBJ/nss.def -o Linux3.19_arm_glibc_PTH_OPT.OBJ/libnss3.so Linux3.19_arm_glibc_PTH_OPT.OBJ/nssinit.o Linux3.19_arm_glibc_PTH_OPT.OBJ/nssver.o Linux3.19_arm_glibc_PTH_OPT.OBJ/utilwrap.o ../certhigh/Linux3.19_arm_glibc_PTH_OPT.OBJ/certhtml.o ../certhigh/Linux3.19_arm_glibc_PTH_OPT.OBJ/certreq.o ../certhigh/Linux3.19_arm_glibc_PTH_OPT.OBJ/crlv2.o ../certhigh/Linux3.19_arm_glibc_PTH_OPT.OBJ/ocsp.o ../certhigh/Linux3.19_arm_glibc_PTH_OPT.OBJ/ocspsig.o ../certhigh/Linux3.19_arm_glibc_PTH_OPT.OBJ/certhigh.o ../certhigh/Linux3.19_arm_glibc_PTH_OPT.OBJ/certvfy.o ../certhigh/Linux3.19_arm_glibc_PTH_OPT.OBJ/certvfypkix.o ../certhigh/Linux3.19_arm_glibc_PTH_OPT.OBJ/certvfypkixprint.o ../certhigh/Linux3.19_arm_glibc_PTH_OPT.OBJ/xcrldist.o ../cryptohi/Linux3.19_arm_glibc_PTH_OPT.OBJ/sechash.o ../cryptohi/Linux3.19_arm_glibc_PTH_OPT.OBJ/seckey.o ../cryptohi/Linux3.19_arm_glibc_PTH_OPT.OBJ/secsign.o ../cryptohi/Linux3.19_arm_glibc_PTH_OPT.OBJ/secvfy.o ../cryptohi/Linux3.19_arm_glibc_PTH_OPT.OBJ/dsautil.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/dev3hack.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11akey.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11auth.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11cert.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11cxt.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11err.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11kea.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11list.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11load.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11mech.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11merge.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11nobj.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11obj.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11pars.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11pbe.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11pk12.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11pqg.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11sdr.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11skey.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11slot.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11util.o ../certdb/Linux3.19_arm_glibc_PTH_OPT.OBJ/alg1485.o ../certdb/Linux3.19_arm_glibc_PTH_OPT.OBJ/certdb.o ../certdb/Linux3.19_arm_glibc_PTH_OPT.OBJ/certv3.o ../certdb/Linux3.19_arm_glibc_PTH_OPT.OBJ/certxutl.o ../certdb/Linux3.19_arm_glibc_PTH_OPT.OBJ/crl.o ../certdb/Linux3.19_arm_glibc_PTH_OPT.OBJ/genname.o ../certdb/Linux3.19_arm_glibc_PTH_OPT.OBJ/stanpcertdb.o ../certdb/Linux3.19_arm_glibc_PTH_OPT.OBJ/polcyxtn.o ../certdb/Linux3.19_arm_glibc_PTH_OPT.OBJ/secname.o ../certdb/Linux3.19_arm_glibc_PTH_OPT.OBJ/xauthkid.o ../certdb/Linux3.19_arm_glibc_PTH_OPT.OBJ/xbsconst.o ../certdb/Linux3.19_arm_glibc_PTH_OPT.OBJ/xconst.o ../pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/asymmkey.o ../pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/certificate.o ../pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/cryptocontext.o ../pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/symmkey.o ../pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/trustdomain.o ../pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/tdcache.o ../pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/certdecode.o ../pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkistore.o ../pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkibase.o ../pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pki3hack.o ../dev/Linux3.19_arm_glibc_PTH_OPT.OBJ/devslot.o ../dev/Linux3.19_arm_glibc_PTH_OPT.OBJ/devtoken.o ../dev/Linux3.19_arm_glibc_PTH_OPT.OBJ/devutil.o ../dev/Linux3.19_arm_glibc_PTH_OPT.OBJ/ckhelper.o ../base/Linux3.19_arm_glibc_PTH_OPT.OBJ/arena.o ../base/Linux3.19_arm_glibc_PTH_OPT.OBJ/error.o ../base/Linux3.19_arm_glibc_PTH_OPT.OBJ/errorval.o ../base/Linux3.19_arm_glibc_PTH_OPT.OBJ/hashops.o ../base/Linux3.19_arm_glibc_PTH_OPT.OBJ/libc.o ../base/Linux3.19_arm_glibc_PTH_OPT.OBJ/tracker.o ../base/Linux3.19_arm_glibc_PTH_OPT.OBJ/item.o ../base/Linux3.19_arm_glibc_PTH_OPT.OBJ/utf8.o ../base/Linux3.19_arm_glibc_PTH_OPT.OBJ/list.o ../base/Linux3.19_arm_glibc_PTH_OPT.OBJ/hash.o ../libpkix/pkix/certsel/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_certselector.o ../libpkix/pkix/certsel/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o ../libpkix/pkix/checker/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o ../libpkix/pkix/checker/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o ../libpkix/pkix/checker/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_crlchecker.o ../libpkix/pkix/checker/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o ../libpkix/pkix/checker/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o ../libpkix/pkix/checker/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o ../libpkix/pkix/checker/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o ../libpkix/pkix/checker/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o ../libpkix/pkix/checker/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o ../libpkix/pkix/checker/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o ../libpkix/pkix/checker/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_policychecker.o ../libpkix/pkix/checker/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o ../libpkix/pkix/checker/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o ../libpkix/pkix/params/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_trustanchor.o ../libpkix/pkix/params/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_procparams.o ../libpkix/pkix/params/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_valparams.o ../libpkix/pkix/params/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o ../libpkix/pkix/results/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_buildresult.o ../libpkix/pkix/results/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_policynode.o ../libpkix/pkix/results/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_valresult.o ../libpkix/pkix/results/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_verifynode.o ../libpkix/pkix/top/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_validate.o ../libpkix/pkix/top/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_lifecycle.o ../libpkix/pkix/top/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_build.o ../libpkix/pkix/util/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_tools.o ../libpkix/pkix/util/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_error.o ../libpkix/pkix/util/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_logger.o ../libpkix/pkix/util/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_list.o ../libpkix/pkix/util/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_errpaths.o ../libpkix/pkix/crlsel/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_crlselector.o ../libpkix/pkix/crlsel/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o ../libpkix/pkix/store/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_store.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_cert.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_crl.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_date.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o ../libpkix/pkix_pl_nss/system/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o ../libpkix/pkix_pl_nss/system/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o ../libpkix/pkix_pl_nss/system/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_common.o ../libpkix/pkix_pl_nss/system/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_error.o ../libpkix/pkix_pl_nss/system/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o ../libpkix/pkix_pl_nss/system/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o ../libpkix/pkix_pl_nss/system/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_mem.o ../libpkix/pkix_pl_nss/system/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o ../libpkix/pkix_pl_nss/system/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o ../libpkix/pkix_pl_nss/system/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_object.o ../libpkix/pkix_pl_nss/system/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_oid.o ../libpkix/pkix_pl_nss/system/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o ../libpkix/pkix_pl_nss/system/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o ../libpkix/pkix_pl_nss/system/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_string.o ../libpkix/pkix_pl_nss/module/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o ../libpkix/pkix_pl_nss/module/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o ../libpkix/pkix_pl_nss/module/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o ../libpkix/pkix_pl_nss/module/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o ../libpkix/pkix_pl_nss/module/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o ../libpkix/pkix_pl_nss/module/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o ../libpkix/pkix_pl_nss/module/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o ../libpkix/pkix_pl_nss/module/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o ../libpkix/pkix_pl_nss/module/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o ../libpkix/pkix_pl_nss/module/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o ../libpkix/pkix_pl_nss/module/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o ../libpkix/pkix_pl_nss/module/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_socket.o   -L/<<PKGBUILDDIR>>/mozilla/dist/lib -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
chmod +x Linux3.19_arm_glibc_PTH_OPT.OBJ/libnss3.so
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libnss.a /<<PKGBUILDDIR>>/mozilla/dist/lib
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/libnss3.so /<<PKGBUILDDIR>>/mozilla/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/nss'
cd ssl; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/ssl'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/derive.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  derive.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/dtlscon.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  dtlscon.c
dtlscon.c: In function 'ssl3_DisableNonDTLSSuites':
dtlscon.c:92:12: warning: unused variable 'rv' [-Wunused-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/prelib.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  prelib.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssl3con.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  ssl3con.c
ssl3con.c: In function 'ssl3_InitPendingContextsBypass':
ssl3con.c:1419:28: warning: variable 'compression_method' set but not used [-Wunused-but-set-variable]
ssl3con.c:1417:26: warning: variable 'macLength' set but not used [-Wunused-but-set-variable]
ssl3con.c: In function 'ssl3_IllegalParameter':
ssl3con.c:2868:12: warning: variable 'isTLS' set but not used [-Wunused-but-set-variable]
ssl3con.c: In function 'ssl3_RecordKeyLog':
ssl3con.c:8913:19: warning: variable 'sid' set but not used [-Wunused-but-set-variable]
ssl3con.c: In function 'ssl3_HandleRecord':
ssl3con.c:10127:21: warning: 'dtls_seq_num' may be used uninitialized in this function [-Wuninitialized]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssl3gthr.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  ssl3gthr.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslauth.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslauth.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslcon.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslcon.c
sslcon.c: In function 'ssl2_HandleMessage':
sslcon.c:2498:22: warning: variable 'rv2' set but not used [-Wunused-but-set-variable]
sslcon.c: In function 'NSSSSL_VersionCheck':
sslcon.c:3687:19: warning: variable 'c' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssldef.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  ssldef.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslenum.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslenum.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslerr.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslerr.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslerrstrs.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslerrstrs.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslinit.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslinit.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssl3ext.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  ssl3ext.c
ssl3ext.c: In function 'ssl3_GetSessionTicketKeys':
ssl3ext.c:195:38: warning: comparison between 'PRStatus' and 'enum _SECStatus' [-Wenum-compare]
ssl3ext.c: In function 'ssl3_HandleServerNameXtn':
ssl3ext.c:390:18: warning: variable 'type' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslgathr.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslgathr.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslmutex.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslmutex.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslnonce.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslnonce.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslreveal.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslreveal.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslsecur.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslsecur.c
sslsecur.c: In function 'ssl_SecureRecv':
sslsecur.c:1103:22: warning: variable 'sec' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslsnce.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslsnce.c
sslsnce.c: In function 'InitCache':
sslsnce.c:1234:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1235:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1236:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1237:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1238:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1239:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1240:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1241:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1242:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1243:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1244:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1245:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1246:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c: In function 'SSL_InheritMPServerSIDCacheInstance':
sslsnce.c:1586:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1587:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1588:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1589:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1590:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1591:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1592:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1593:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1594:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1595:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1596:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1597:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1598:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslsock.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslsock.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssltrace.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  ssltrace.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslver.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslver.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/authcert.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  authcert.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmpcert.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmpcert.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslinfo.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslinfo.c
sslinfo.c: In function 'SSL_DisableDefaultExportCipherSuites':
sslinfo.c:239:15: warning: variable 'rv' set but not used [-Wunused-but-set-variable]
sslinfo.c: In function 'SSL_DisableExportCipherSuites':
sslinfo.c:260:15: warning: variable 'rv' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssl3ecc.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  ssl3ecc.c
ssl3ecc.c: In function 'ssl3_DisableECCSuites':
ssl3ecc.c:907:12: warning: unused variable 'rv' [-Wunused-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/unix_err.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  unix_err.c
rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libssl.a
ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libssl.a Linux3.19_arm_glibc_PTH_OPT.OBJ/derive.o Linux3.19_arm_glibc_PTH_OPT.OBJ/dtlscon.o Linux3.19_arm_glibc_PTH_OPT.OBJ/prelib.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssl3con.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssl3gthr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslauth.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslcon.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssldef.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslenum.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslerr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslerrstrs.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslinit.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssl3ext.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslgathr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslmutex.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslnonce.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslreveal.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslsecur.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslsnce.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslsock.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssltrace.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslver.o Linux3.19_arm_glibc_PTH_OPT.OBJ/authcert.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmpcert.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslinfo.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssl3ecc.o Linux3.19_arm_glibc_PTH_OPT.OBJ/unix_err.o
ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libssl.a
grep -v ';-' ssl.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.19_arm_glibc_PTH_OPT.OBJ/ssl.def
rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libssl3.so
gcc -shared -Wl,-z,relro  -Wl,-z,defs -Wl,-soname -Wl,libssl3.so  -Wl,--version-script,Linux3.19_arm_glibc_PTH_OPT.OBJ/ssl.def -o Linux3.19_arm_glibc_PTH_OPT.OBJ/libssl3.so Linux3.19_arm_glibc_PTH_OPT.OBJ/derive.o Linux3.19_arm_glibc_PTH_OPT.OBJ/dtlscon.o Linux3.19_arm_glibc_PTH_OPT.OBJ/prelib.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssl3con.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssl3gthr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslauth.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslcon.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssldef.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslenum.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslerr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslerrstrs.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslinit.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssl3ext.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslgathr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslmutex.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslnonce.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslreveal.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslsecur.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslsnce.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslsock.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssltrace.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslver.o Linux3.19_arm_glibc_PTH_OPT.OBJ/authcert.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmpcert.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslinfo.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssl3ecc.o Linux3.19_arm_glibc_PTH_OPT.OBJ/unix_err.o   /<<PKGBUILDDIR>>/mozilla/dist/lib/libfreebl.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc -lz
chmod +x Linux3.19_arm_glibc_PTH_OPT.OBJ/libssl3.so
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libssl.a /<<PKGBUILDDIR>>/mozilla/dist/lib
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/libssl3.so /<<PKGBUILDDIR>>/mozilla/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/ssl'
cd pkcs12; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/pkcs12'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p12local.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p12local.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p12creat.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p12creat.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p12dec.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p12dec.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p12plcy.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p12plcy.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p12tmpl.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p12tmpl.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p12e.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p12e.c
p12e.c: In function 'sec_PKCS12CreateSafeBag':
p12e.c:698:12: warning: variable 'setName' set but not used [-Wunused-but-set-variable]
p12e.c: In function 'sec_pkcs12_encoder_start_context':
p12e.c:1535:12: warning: variable 'rv' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p12d.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p12d.c
p12d.c: In function 'SEC_PKCS12DecoderImportBags':
p12d.c:2465:9: warning: 'keyUsage' may be used uninitialized in this function [-Wuninitialized]
p12d.c:2888:19: note: 'keyUsage' was declared here
rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkcs12.a
ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkcs12.a Linux3.19_arm_glibc_PTH_OPT.OBJ/p12local.o Linux3.19_arm_glibc_PTH_OPT.OBJ/p12creat.o Linux3.19_arm_glibc_PTH_OPT.OBJ/p12dec.o Linux3.19_arm_glibc_PTH_OPT.OBJ/p12plcy.o Linux3.19_arm_glibc_PTH_OPT.OBJ/p12tmpl.o Linux3.19_arm_glibc_PTH_OPT.OBJ/p12e.o Linux3.19_arm_glibc_PTH_OPT.OBJ/p12d.o
ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkcs12.a
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkcs12.a /<<PKGBUILDDIR>>/mozilla/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/pkcs12'
cd pkcs7; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/pkcs7'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certread.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  certread.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7common.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p7common.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7create.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p7create.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7decode.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p7decode.c
p7decode.c: In function 'sec_pkcs7_verify_signature':
p7decode.c:1290:21: warning: variable 'crls' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7encode.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p7encode.c
p7encode.c: In function 'sec_pkcs7_encoder_start_encrypt':
p7encode.c:64:18: warning: variable 'wincx' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7local.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p7local.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/secmime.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secmime.c
rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkcs7.a
ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkcs7.a Linux3.19_arm_glibc_PTH_OPT.OBJ/certread.o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7common.o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7create.o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7decode.o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7encode.o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7local.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secmime.o
ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkcs7.a
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkcs7.a /<<PKGBUILDDIR>>/mozilla/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/pkcs7'
cd smime; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/smime'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsarray.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsarray.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsasn1.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsasn1.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsattr.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsattr.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmscinfo.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmscinfo.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmscipher.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmscipher.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsdecode.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsdecode.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsdigdata.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsdigdata.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsdigest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsdigest.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsencdata.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsencdata.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsencode.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsencode.c
cmsencode.c: In function 'nss_cms_encoder_notify':
cmsencode.c:127:18: warning: variable 'poolp' set but not used [-Wunused-but-set-variable]
cmsencode.c: In function 'nss_cms_before_data':
cmsencode.c:206:18: warning: variable 'poolp' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsenvdata.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsenvdata.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsmessage.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsmessage.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmspubkey.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmspubkey.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsrecinfo.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsrecinfo.c
cmsrecinfo.c: In function 'NSS_CMSRecipientInfo_UnwrapBulkKey':
cmsrecinfo.c:531:21: warning: variable 'encalg' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsreclist.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsreclist.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmssigdata.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmssigdata.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmssiginfo.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmssiginfo.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsudf.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsudf.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsutil.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/smimemessage.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  smimemessage.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/smimeutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  smimeutil.c
smimeutil.c: In function 'NSSSMIME_VersionCheck':
smimeutil.c:772:19: warning: variable 'c' set but not used [-Wunused-but-set-variable]
smimeutil.c: In function 'NSS_SMIMEUtil_FindBulkAlgForRecipients':
smimeutil.c:448:9: warning: 'key_type' may be used uninitialized in this function [-Wuninitialized]
smimeutil.c:427:14: note: 'key_type' was declared here
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/smimever.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  smimever.c
rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libsmime.a
ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libsmime.a Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsarray.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsasn1.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsattr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmscinfo.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmscipher.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsdecode.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsdigdata.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsdigest.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsencdata.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsencode.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsenvdata.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsmessage.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmspubkey.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsrecinfo.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsreclist.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmssigdata.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmssiginfo.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsudf.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsutil.o Linux3.19_arm_glibc_PTH_OPT.OBJ/smimemessage.o Linux3.19_arm_glibc_PTH_OPT.OBJ/smimeutil.o Linux3.19_arm_glibc_PTH_OPT.OBJ/smimever.o
ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libsmime.a
grep -v ';-' smime.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.19_arm_glibc_PTH_OPT.OBJ/smime.def
rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libsmime3.so
gcc -shared -Wl,-z,relro  -Wl,-z,defs -Wl,-soname -Wl,libsmime3.so  -Wl,--version-script,Linux3.19_arm_glibc_PTH_OPT.OBJ/smime.def -o Linux3.19_arm_glibc_PTH_OPT.OBJ/libsmime3.so Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsarray.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsasn1.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsattr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmscinfo.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmscipher.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsdecode.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsdigdata.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsdigest.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsencdata.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsencode.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsenvdata.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsmessage.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmspubkey.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsrecinfo.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsreclist.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmssigdata.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmssiginfo.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsudf.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsutil.o Linux3.19_arm_glibc_PTH_OPT.OBJ/smimemessage.o Linux3.19_arm_glibc_PTH_OPT.OBJ/smimeutil.o Linux3.19_arm_glibc_PTH_OPT.OBJ/smimever.o ../pkcs12/Linux3.19_arm_glibc_PTH_OPT.OBJ/p12local.o ../pkcs12/Linux3.19_arm_glibc_PTH_OPT.OBJ/p12creat.o ../pkcs12/Linux3.19_arm_glibc_PTH_OPT.OBJ/p12dec.o ../pkcs12/Linux3.19_arm_glibc_PTH_OPT.OBJ/p12plcy.o ../pkcs12/Linux3.19_arm_glibc_PTH_OPT.OBJ/p12tmpl.o ../pkcs12/Linux3.19_arm_glibc_PTH_OPT.OBJ/p12e.o ../pkcs12/Linux3.19_arm_glibc_PTH_OPT.OBJ/p12d.o ../pkcs7/Linux3.19_arm_glibc_PTH_OPT.OBJ/certread.o ../pkcs7/Linux3.19_arm_glibc_PTH_OPT.OBJ/p7common.o ../pkcs7/Linux3.19_arm_glibc_PTH_OPT.OBJ/p7create.o ../pkcs7/Linux3.19_arm_glibc_PTH_OPT.OBJ/p7decode.o ../pkcs7/Linux3.19_arm_glibc_PTH_OPT.OBJ/p7encode.o ../pkcs7/Linux3.19_arm_glibc_PTH_OPT.OBJ/p7local.o ../pkcs7/Linux3.19_arm_glibc_PTH_OPT.OBJ/secmime.o   -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
chmod +x Linux3.19_arm_glibc_PTH_OPT.OBJ/libsmime3.so
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libsmime.a /<<PKGBUILDDIR>>/mozilla/dist/lib
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/libsmime3.so /<<PKGBUILDDIR>>/mozilla/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/smime'
cd crmf; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/crmf'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmfenc.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  crmfenc.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmftmpl.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  crmftmpl.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmfreq.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  crmfreq.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmfpop.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  crmfpop.c
crmfpop.c: In function 'CRMF_CertReqMsgSetRAVerifiedPOP':
crmfpop.c:36:28: warning: variable 'dummy' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmfdec.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  crmfdec.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmfget.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  crmfget.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmfcont.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  crmfcont.c
crmfcont.c: In function 'CRMF_CreateEncryptedKeyWithEncryptedValue':
crmfcont.c:860:31: warning: variable 'dummy' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmmfasn1.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmmfasn1.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmmfresp.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmmfresp.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmmfrec.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmmfrec.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmmfchal.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmmfchal.c
cmmfchal.c: In function 'cmmf_create_witness_and_challenge':
cmmfchal.c:33:22: warning: variable 'id' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/servget.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  servget.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/encutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  encutil.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/respcli.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  respcli.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/respcmn.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  respcmn.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/challcli.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  challcli.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/asn1cmn.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  asn1cmn.c
rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libcrmf.a
ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libcrmf.a Linux3.19_arm_glibc_PTH_OPT.OBJ/crmfenc.o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmftmpl.o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmfreq.o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmfpop.o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmfdec.o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmfget.o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmfcont.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmmfasn1.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmmfresp.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmmfrec.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmmfchal.o Linux3.19_arm_glibc_PTH_OPT.OBJ/servget.o Linux3.19_arm_glibc_PTH_OPT.OBJ/encutil.o Linux3.19_arm_glibc_PTH_OPT.OBJ/respcli.o Linux3.19_arm_glibc_PTH_OPT.OBJ/respcmn.o Linux3.19_arm_glibc_PTH_OPT.OBJ/challcli.o Linux3.19_arm_glibc_PTH_OPT.OBJ/asn1cmn.o
ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libcrmf.a
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libcrmf.a /<<PKGBUILDDIR>>/mozilla/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/crmf'
cd jar; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/jar'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/jarver.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  jarver.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/jarsign.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  jarsign.c
jarsign.c: In function 'jar_create_pk7':
jarsign.c:174:11: warning: variable 'errstring' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/jar.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  jar.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/jar-ds.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  jar-ds.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/jarfile.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  jarfile.c
jarfile.c: In function 'jar_listtar':
jarfile.c:824:12: warning: variable 'when' set but not used [-Wunused-but-set-variable]
jarfile.c:823:14: warning: variable 'mode' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/jarint.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  jarint.c
rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libjar.a
ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libjar.a Linux3.19_arm_glibc_PTH_OPT.OBJ/jarver.o Linux3.19_arm_glibc_PTH_OPT.OBJ/jarsign.o Linux3.19_arm_glibc_PTH_OPT.OBJ/jar.o Linux3.19_arm_glibc_PTH_OPT.OBJ/jar-ds.o Linux3.19_arm_glibc_PTH_OPT.OBJ/jarfile.o Linux3.19_arm_glibc_PTH_OPT.OBJ/jarint.o
ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libjar.a
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libjar.a /<<PKGBUILDDIR>>/mozilla/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/jar'
cd ckfw; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/ckfw'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/crypto.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  crypto.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/find.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  find.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/hash.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  hash.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/instance.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  instance.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/mutex.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  mutex.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/object.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  object.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/session.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  session.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sessobj.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  sessobj.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/slot.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  slot.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/token.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  token.c
token.c: In function 'nssCKFWToken_GetUTCTime':
token.c:1265:27: warning: variable 'z' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/wrap.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  wrap.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/mechanism.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  mechanism.c
rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssckfw.a
ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssckfw.a Linux3.19_arm_glibc_PTH_OPT.OBJ/crypto.o Linux3.19_arm_glibc_PTH_OPT.OBJ/find.o Linux3.19_arm_glibc_PTH_OPT.OBJ/hash.o Linux3.19_arm_glibc_PTH_OPT.OBJ/instance.o Linux3.19_arm_glibc_PTH_OPT.OBJ/mutex.o Linux3.19_arm_glibc_PTH_OPT.OBJ/object.o Linux3.19_arm_glibc_PTH_OPT.OBJ/session.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sessobj.o Linux3.19_arm_glibc_PTH_OPT.OBJ/slot.o Linux3.19_arm_glibc_PTH_OPT.OBJ/token.o Linux3.19_arm_glibc_PTH_OPT.OBJ/wrap.o Linux3.19_arm_glibc_PTH_OPT.OBJ/mechanism.o
ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssckfw.a
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssckfw.a /<<PKGBUILDDIR>>/mozilla/dist/lib
cd builtins; /usr/bin/make libs
make[5]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/ckfw/builtins'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/anchor.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I.  anchor.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/constants.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I.  constants.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/bfind.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I.  bfind.c
bfind.c: In function 'nss_builtins_FindObjectsInit':
bfind.c:126:19: warning: 'data' may be used uninitialized in this function [-Wuninitialized]
bfind.c:122:17: note: 'data' was declared here
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/binst.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I.  binst.c
binst.c: In function 'builtins_mdInstance_GetLibraryVersion':
binst.c:74:17: warning: variable 'c' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/bobject.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I.  bobject.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/bsession.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I.  bsession.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/bslot.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I.  bslot.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/btoken.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I.  btoken.c
perl certdata.perl < certdata.txt > Linux3.19_arm_glibc_PTH_OPT.OBJ/certdata.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certdata.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I.  Linux3.19_arm_glibc_PTH_OPT.OBJ/certdata.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ckbiver.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I.  ckbiver.c
grep -v ';-' nssckbi.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.19_arm_glibc_PTH_OPT.OBJ/nssckbi.def
rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssckbi.so
gcc -shared -Wl,-z,relro  -Wl,-z,defs -Wl,-soname -Wl,libnssckbi.so  -Wl,--version-script,Linux3.19_arm_glibc_PTH_OPT.OBJ/nssckbi.def -o Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssckbi.so Linux3.19_arm_glibc_PTH_OPT.OBJ/anchor.o Linux3.19_arm_glibc_PTH_OPT.OBJ/constants.o Linux3.19_arm_glibc_PTH_OPT.OBJ/bfind.o Linux3.19_arm_glibc_PTH_OPT.OBJ/binst.o Linux3.19_arm_glibc_PTH_OPT.OBJ/bobject.o Linux3.19_arm_glibc_PTH_OPT.OBJ/bsession.o Linux3.19_arm_glibc_PTH_OPT.OBJ/bslot.o Linux3.19_arm_glibc_PTH_OPT.OBJ/btoken.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certdata.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ckbiver.o   /<<PKGBUILDDIR>>/mozilla/dist/lib/libnssckfw.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libnssb.a  -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
chmod +x Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssckbi.so
../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssckbi.so /<<PKGBUILDDIR>>/mozilla/dist/lib
make[5]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/ckfw/builtins'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib/ckfw'
make[3]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/lib'
cd cmd; /usr/bin/make libs
make[3]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd'
cd lib; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/lib'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/basicutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  basicutil.c
basicutil.c: In function 'SECU_PrintAsHex':
basicutil.c:279:13: warning: 'column' may be used uninitialized in this function [-Wuninitialized]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/secutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secutil.c
secutil.c: In function 'SECU_ChangePW2':
secutil.c:319:15: warning: variable 'rv' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/secpwd.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secpwd.c
secpwd.c: In function 'SEC_GetPassword':
secpwd.c:77:14: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result [-Wunused-result]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/derprint.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  derprint.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/moreoids.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  moreoids.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pppolicy.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pppolicy.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ffs.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  ffs.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11table.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11table.c
rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libsectool.a
ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libsectool.a Linux3.19_arm_glibc_PTH_OPT.OBJ/basicutil.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secutil.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secpwd.o Linux3.19_arm_glibc_PTH_OPT.OBJ/derprint.o Linux3.19_arm_glibc_PTH_OPT.OBJ/moreoids.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pppolicy.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ffs.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11table.o
ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libsectool.a
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libsectool.a /<<PKGBUILDDIR>>/mozilla/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/lib'
cd addbuiltin; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/addbuiltin'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/addbuiltin.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd  addbuiltin.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/addbuiltin -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd  Linux3.19_arm_glibc_PTH_OPT.OBJ/addbuiltin.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/addbuiltin /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/addbuiltin'
cd atob; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/atob'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/atob.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  atob.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/atob -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.19_arm_glibc_PTH_OPT.OBJ/atob.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/atob /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/atob'
cd bltest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/bltest'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/blapitest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../nss/lib/softoken -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -I../../../../dist/public/softoken  blapitest.c
blapitest.c: In function 'serialize_key':
blapitest.c:322:15: warning: variable 'status' set but not used [-Wunused-but-set-variable]
blapitest.c: In function 'dsaOp':
blapitest.c:2222:17: warning: variable 'L100' set but not used [-Wunused-but-set-variable]
blapitest.c:2254:17: warning: variable 'L100' set but not used [-Wunused-but-set-variable]
blapitest.c:2290:13: warning: variable 'L100' set but not used [-Wunused-but-set-variable]
blapitest.c: In function 'ecdsaOp':
blapitest.c:2344:17: warning: variable 'L100' set but not used [-Wunused-but-set-variable]
blapitest.c:2377:17: warning: variable 'L100' set but not used [-Wunused-but-set-variable]
blapitest.c:2412:13: warning: variable 'L100' set but not used [-Wunused-but-set-variable]
blapitest.c: In function 'cipherDoOp':
blapitest.c:2488:13: warning: variable 'L100' set but not used [-Wunused-but-set-variable]
blapitest.c:2522:13: warning: variable 'L100' set but not used [-Wunused-but-set-variable]
blapitest.c:2556:13: warning: variable 'L100' set but not used [-Wunused-but-set-variable]
blapitest.c: In function 'printPR_smpString':
blapitest.c:2692:13: warning: variable 'prnRes' set but not used [-Wunused-but-set-variable]
blapitest.c: In function 'main':
blapitest.c:3574:11: warning: variable 'infileName' set but not used [-Wunused-but-set-variable]
blapitest.c:3693:5: warning: 'ret' may be used uninitialized in this function [-Wuninitialized]
blapitest.c:4113:30: warning: 'totalTime' may be used uninitialized in this function [-Wuninitialized]
blapitest.c:3830:18: warning: 'cipherInfo' may be used uninitialized in this function [-Wuninitialized]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/bltest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../nss/lib/softoken -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -I../../../../dist/public/softoken  Linux3.19_arm_glibc_PTH_OPT.OBJ/blapitest.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsmime.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libssl.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libnss.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libssl.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkcs12.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkcs7.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libcerthi.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libcryptohi.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libcerthi.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libnsspki.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libsoftokn.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libcertdb.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libnsspki.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libnssdev.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libnssb.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libfreebl.a  /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixutil.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixsystem.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixcrlsel.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixmodule.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixstore.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixparams.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixchecker.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixpki.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixresults.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixcertsel.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libnss.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libcerthi.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lsqlite3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/bltest /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/bltest'
cd btoa; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/btoa'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/btoa.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  btoa.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/btoa -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.19_arm_glibc_PTH_OPT.OBJ/btoa.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/btoa /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/btoa'
cd certcgi; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/certcgi'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certcgi.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  certcgi.c
certcgi.c: In function 'MakeV1Cert':
certcgi.c:530:15: warning: variable 'rv' set but not used [-Wunused-but-set-variable]
certcgi.c: In function 'get_serial_number':
certcgi.c:594:6: warning: this decimal constant is unsigned only in ISO C90 [enabled by default]
certcgi.c: In function 'string_to_binary':
certcgi.c:1425:24: warning: variable 'low_digit' set but not used [-Wunused-but-set-variable]
certcgi.c:1424:24: warning: variable 'high_digit' set but not used [-Wunused-but-set-variable]
certcgi.c: At top level:
certcgi.c:360:1: warning: 'update_data_by_name' defined but not used [-Wunused-function]
certcgi.c:388:1: warning: 'update_data_by_index' defined but not used [-Wunused-function]
certcgi.c:404:1: warning: 'add_field' defined but not used [-Wunused-function]
certcgi.c: In function 'get_serial_number':
certcgi.c:590:11: warning: ignoring return value of 'fread', declared with attribute warn_unused_result [-Wunused-result]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certcgi -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.19_arm_glibc_PTH_OPT.OBJ/certcgi.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsmime.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libssl.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libnss.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libssl.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkcs12.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkcs7.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libcerthi.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libcryptohi.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libcerthi.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libnsspki.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libsoftokn.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libcertdb.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libnsspki.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libnssdev.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libnssb.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libfreebl.a  /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixutil.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixsystem.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixcrlsel.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixmodule.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixstore.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixparams.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixchecker.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixpki.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixresults.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixcertsel.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libnss.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libcerthi.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lsqlite3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/certcgi /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/certcgi'
cd certutil; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/certutil'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certext.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  certext.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  certutil.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/keystuff.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  keystuff.c
keystuff.c: In function 'CERTUTIL_GeneratePrivateKey':
keystuff.c:496:24: warning: variable 'algtag' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certutil -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  Linux3.19_arm_glibc_PTH_OPT.OBJ/certext.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certutil.o Linux3.19_arm_glibc_PTH_OPT.OBJ/keystuff.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/certutil /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/certutil'
cd checkcert; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/checkcert'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/checkcert.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  checkcert.c
checkcert.c: In function 'OurVerifyData':
checkcert.c:125:15: warning: variable 'sigAlgTag' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/checkcert -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.19_arm_glibc_PTH_OPT.OBJ/checkcert.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/checkcert /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/checkcert'
cd chktest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/chktest'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/chktest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  chktest.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/chktest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.19_arm_glibc_PTH_OPT.OBJ/chktest.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsmime.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libssl.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libnss.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libssl.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkcs12.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkcs7.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libcerthi.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libcryptohi.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libcerthi.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libnsspki.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libsoftokn.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libcertdb.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libnsspki.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libnssdev.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libnssb.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libfreebl.a  /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixutil.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixsystem.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixcrlsel.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixmodule.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixstore.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixparams.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixchecker.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixpki.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixresults.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixcertsel.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libnss.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libcerthi.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lsqlite3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/chktest /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/chktest'
cd crlutil; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/crlutil'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/crlgen_lex.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  crlgen_lex.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/crlgen.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  crlgen.c
crlgen.c: In function 'crlgen_RmCert':
crlgen.c:1082:18: warning: variable 'arena' set but not used [-Wunused-but-set-variable]
crlgen.c: In function 'crlgen_CreateInvalidityDate':
crlgen.c:627:22: warning: 'mark' may be used uninitialized in this function [-Wuninitialized]
crlgen.c: In function 'crlgen_CreateReasonCode':
crlgen.c:586:23: warning: 'mark' may be used uninitialized in this function [-Wuninitialized]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/crlutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  crlutil.c
crlutil.c: In function 'main':
crlutil.c:1108:5: warning: 'rv' may be used uninitialized in this function [-Wuninitialized]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/crlutil -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.19_arm_glibc_PTH_OPT.OBJ/crlgen_lex.o Linux3.19_arm_glibc_PTH_OPT.OBJ/crlgen.o Linux3.19_arm_glibc_PTH_OPT.OBJ/crlutil.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/crlutil /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/crlutil'
cd crmftest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/crmftest'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/testcrmf.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  testcrmf.c
testcrmf.c: In function 'get_serial_number':
testcrmf.c:130:16: warning: variable 'rv' set but not used [-Wunused-but-set-variable]
testcrmf.c: In function 'main':
testcrmf.c:1539:23: warning: variable 'PArg' set but not used [-Wunused-but-set-variable]
testcrmf.c:1538:23: warning: variable 'sArg' set but not used [-Wunused-but-set-variable]
testcrmf.c:1537:23: warning: variable 'eArg' set but not used [-Wunused-but-set-variable]
testcrmf.c:1536:23: warning: variable 'pArg' set but not used [-Wunused-but-set-variable]
testcrmf.c: At top level:
testcrmf.c:941:1: warning: 'mapWrapKeyType' defined but not used [-Wunused-function]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmftest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  Linux3.19_arm_glibc_PTH_OPT.OBJ/testcrmf.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libcrmf.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/crmftest /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/crmftest'
cd dbtest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/dbtest'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/dbtest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  dbtest.c
../modutil/error.h:136:14: warning: 'msgStrings' defined but not used [-Wunused-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/dbtest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.19_arm_glibc_PTH_OPT.OBJ/dbtest.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/dbtest /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/dbtest'
cd derdump; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/derdump'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/derdump.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  derdump.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/derdump -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.19_arm_glibc_PTH_OPT.OBJ/derdump.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/derdump /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/derdump'
cd digest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/digest'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/digest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  digest.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/digest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.19_arm_glibc_PTH_OPT.OBJ/digest.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/digest /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/digest'
cd httpserv; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/httpserv'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/httpserv.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  httpserv.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/httpserv -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.19_arm_glibc_PTH_OPT.OBJ/httpserv.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/httpserv /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/httpserv'
cd fipstest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/fipstest'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/fipstest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  fipstest.c
fipstest.c: In function 'drbg':
fipstest.c:2602:12: warning: variable 'predictionResistance' set but not used [-Wunused-but-set-variable]
fipstest.c: At top level:
fipstest.c:2540:1: warning: 'alloc_value' defined but not used [-Wunused-function]
fipstest.c: In function 'tdea_kat_mmt':
fipstest.c:456:16: warning: 'mode' may be used uninitialized in this function [-Wuninitialized]
fipstest.c: In function 'aes_kat_mmt':
fipstest.c:1116:9: warning: 'keysize' may be used uninitialized in this function [-Wuninitialized]
fipstest.c:1116:9: warning: 'mode' may be used uninitialized in this function [-Wuninitialized]
fipstest.c: In function 'aes_ecb_mct':
fipstest.c:1380:6: warning: 'keysize' may be used uninitialized in this function [-Wuninitialized]
fipstest.c: In function 'aes_cbc_mct':
fipstest.c:1763:19: warning: 'keysize' may be used uninitialized in this function [-Wuninitialized]
fipstest.c: In function 'ecdsa_pkv_test':
fipstest.c:2179:15: warning: 'len' may be used uninitialized in this function [-Wuninitialized]
fipstest.c: In function 'ecdsa_sigver_test':
fipstest.c:2514:23: warning: 'olen' may be used uninitialized in this function [-Wuninitialized]
fipstest.c:2477:15: warning: 'flen' may be used uninitialized in this function [-Wuninitialized]
fipstest.c: In function 'rng_vst':
fipstest.c:3066:19: warning: 'b' may be used uninitialized in this function [-Wuninitialized]
fipstest.c: In function 'rng_mct':
fipstest.c:3190:19: warning: 'b' may be used uninitialized in this function [-Wuninitialized]
fipstest.c: In function 'sha_test':
fipstest.c:3495:26: warning: 'msgLen' may be used uninitialized in this function [-Wuninitialized]
fipstest.c:3495:26: warning: 'MDlen' may be used uninitialized in this function [-Wuninitialized]
fipstest.c: In function 'hmac_test':
fipstest.c:3563:13: warning: 'hash_alg' may be used uninitialized in this function [-Wuninitialized]
fipstest.c:3608:19: note: 'hash_alg' was declared here
fipstest.c:3636:23: warning: 'TLen' may be used uninitialized in this function [-Wuninitialized]
fipstest.c:3577:17: warning: 'HMACLen' may be used uninitialized in this function [-Wuninitialized]
fipstest.c:3602:18: note: 'HMACLen' was declared here
fipstest.c:3592:6: warning: 'keyLen' may be used uninitialized in this function [-Wuninitialized]
fipstest.c: In function 'dsa_pqgver_test':
fipstest.c:4030:30: warning: 'pghSize' may be used uninitialized in this function [-Wuninitialized]
fipstest.c: In function 'dsa_pqggen_test':
fipstest.c:4310:24: warning: 'keySizeIndex' may be used uninitialized in this function [-Wuninitialized]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/fipstest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  Linux3.19_arm_glibc_PTH_OPT.OBJ/fipstest.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsmime.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libssl.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libnss.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libssl.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkcs12.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkcs7.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libcerthi.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libcryptohi.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libcerthi.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libnsspki.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libsoftokn.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libcertdb.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libnsspki.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libnssdev.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libnssb.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libfreebl.a  /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixutil.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixsystem.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixcrlsel.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixmodule.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixstore.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixparams.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixchecker.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixpki.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixresults.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixcertsel.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libnss.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libcerthi.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lsqlite3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/fipstest /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/fipstest'
cd lowhashtest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/lowhashtest'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/lowhashtest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I../../../nss/lib/freebl -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -I../../../../dist/public/softoken  lowhashtest.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/lowhashtest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I../../../nss/lib/freebl -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -I../../../../dist/public/softoken  Linux3.19_arm_glibc_PTH_OPT.OBJ/lowhashtest.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -lfreebl3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/lowhashtest /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/lowhashtest'
cd listsuites; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/listsuites'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/listsuites.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  listsuites.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/listsuites -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  Linux3.19_arm_glibc_PTH_OPT.OBJ/listsuites.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/listsuites /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/listsuites'
cd makepqg; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/makepqg'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/makepqg.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm  makepqg.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/makepqg -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm  Linux3.19_arm_glibc_PTH_OPT.OBJ/makepqg.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/makepqg /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/makepqg'
cd multinit; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/multinit'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/multinit.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss  -I../../../../dist/private/nss   multinit.c
multinit.c:320:1: warning: 'appendItem' defined but not used [-Wunused-function]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/multinit -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss  -I../../../../dist/private/nss   Linux3.19_arm_glibc_PTH_OPT.OBJ/multinit.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/multinit /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/multinit'
cd ocspclnt; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/ocspclnt'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ocspclnt.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  ocspclnt.c
ocspclnt.c: In function 'main':
ocspclnt.c:448:8: warning: 'cert_usage' may be used uninitialized in this function [-Wuninitialized]
ocspclnt.c:969:18: note: 'cert_usage' was declared here
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ocspclnt -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  Linux3.19_arm_glibc_PTH_OPT.OBJ/ocspclnt.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/ocspclnt /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/ocspclnt'
cd ocspresp; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/ocspresp'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ocspresp.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  ocspresp.c
ocspresp.c: In function 'main':
ocspresp.c:140:15: warning: variable 'statusDecodedFail' set but not used [-Wunused-but-set-variable]
ocspresp.c:136:15: warning: variable 'statusDecodedRev' set but not used [-Wunused-but-set-variable]
ocspresp.c:132:15: warning: variable 'statusDecoded' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ocspresp -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  Linux3.19_arm_glibc_PTH_OPT.OBJ/ocspresp.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/ocspresp /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/ocspresp'
cd oidcalc; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/oidcalc'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/oidcalc.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  oidcalc.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/oidcalc -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.19_arm_glibc_PTH_OPT.OBJ/oidcalc.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/oidcalc /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/oidcalc'
cd p7content; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/p7content'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7content.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  p7content.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7content -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  Linux3.19_arm_glibc_PTH_OPT.OBJ/p7content.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/p7content /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/p7content'
cd p7env; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/p7env'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7env.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  p7env.c
p7env.c: In function 'main':
p7env.c:135:11: warning: variable 'certName' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7env -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  Linux3.19_arm_glibc_PTH_OPT.OBJ/p7env.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/p7env /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/p7env'
cd p7sign; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/p7sign'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7sign.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  p7sign.c
p7sign.c: In function 'main':
p7sign.c:263:32: warning: 'cert' may be used uninitialized in this function [-Wuninitialized]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7sign -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  Linux3.19_arm_glibc_PTH_OPT.OBJ/p7sign.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/p7sign /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/p7sign'
cd p7verify; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/p7verify'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7verify.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  p7verify.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7verify -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  Linux3.19_arm_glibc_PTH_OPT.OBJ/p7verify.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/p7verify /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/p7verify'
cd pk12util; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/pk12util'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk12util.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  pk12util.c
pk12util.c: In function 'p12u_InitContext':
pk12util.c:104:12: warning: variable 'fileExist' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk12util -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  Linux3.19_arm_glibc_PTH_OPT.OBJ/pk12util.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/pk12util /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/pk12util'
cd pk11mode; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/pk11mode'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11mode.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  pk11mode.c
pk11mode.c: In function 'PKM_TLSMasterKeyDerive':
pk11mode.c:4561:29: warning: variable 'expected_version' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11mode -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11mode.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11mode /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/pk11mode'
cd pk1sign; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/pk1sign'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk1sign.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  pk1sign.c
pk1sign.c: In function 'main':
pk1sign.c:282:32: warning: 'cert' may be used uninitialized in this function [-Wuninitialized]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk1sign -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  Linux3.19_arm_glibc_PTH_OPT.OBJ/pk1sign.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/pk1sign /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/pk1sign'
cd pkix-errcodes; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/pkix-errcodes'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix-errcodes.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  pkix-errcodes.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix-errcodes -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix-errcodes.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix-errcodes /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/pkix-errcodes'
cd pp; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/pp'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pp.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  pp.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pp -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.19_arm_glibc_PTH_OPT.OBJ/pp.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/pp /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/pp'
cd pwdecrypt; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/pwdecrypt'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pwdecrypt.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  pwdecrypt.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pwdecrypt -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  Linux3.19_arm_glibc_PTH_OPT.OBJ/pwdecrypt.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/pwdecrypt /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/pwdecrypt'
cd rsaperf; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/rsaperf'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/rsaperf.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../nss/lib/softoken -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  rsaperf.c
rsaperf.c: In function 'main':
rsaperf.c:433:27: warning: variable 'certdb' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/defkey.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../nss/lib/softoken -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  defkey.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/rsaperf -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../nss/lib/softoken -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  Linux3.19_arm_glibc_PTH_OPT.OBJ/rsaperf.o Linux3.19_arm_glibc_PTH_OPT.OBJ/defkey.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsmime.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libssl.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libnss.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libssl.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkcs12.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkcs7.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libcerthi.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libcryptohi.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libcerthi.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libnsspki.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libsoftokn.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libcertdb.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libnsspki.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libnssdev.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libnssb.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libfreebl.a  /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixutil.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixsystem.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixcrlsel.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixmodule.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixstore.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixparams.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixchecker.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixpki.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixresults.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixcertsel.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libnss.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libcerthi.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lsqlite3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/rsaperf /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/rsaperf'
cd sdrtest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/sdrtest'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sdrtest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  sdrtest.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sdrtest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  Linux3.19_arm_glibc_PTH_OPT.OBJ/sdrtest.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/sdrtest /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/sdrtest'
cd selfserv; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/selfserv'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/selfserv.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  selfserv.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/selfserv -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.19_arm_glibc_PTH_OPT.OBJ/selfserv.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/selfserv /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/selfserv'
cd signtool; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/signtool'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/signtool.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  signtool.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certgen.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  certgen.c
certgen.c: In function 'sign_cert':
certgen.c:423:11: warning: variable 'dummy' set but not used [-Wunused-but-set-variable]
certgen.c: In function 'GetSubjectFromUser':
certgen.c:125:10: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result [-Wunused-result]
certgen.c:147:10: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result [-Wunused-result]
certgen.c:166:10: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result [-Wunused-result]
certgen.c:184:10: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result [-Wunused-result]
certgen.c:202:10: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result [-Wunused-result]
certgen.c:223:10: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result [-Wunused-result]
certgen.c:241:10: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result [-Wunused-result]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/javascript.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  javascript.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/list.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  list.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sign.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  sign.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/util.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  util.c
util.c: In function 'XP_GetString':
util.c:21:5: warning: return discards 'const' qualifier from pointer target type [enabled by default]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/verify.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  verify.c
verify.c: In function 'VerifyJar':
verify.c:55:11: warning: assignment discards 'const' qualifier from pointer target type [enabled by default]
verify.c: In function 'JarWho':
verify.c:286:11: warning: assignment discards 'const' qualifier from pointer target type [enabled by default]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/zip.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  zip.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/signtool -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  Linux3.19_arm_glibc_PTH_OPT.OBJ/signtool.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certgen.o Linux3.19_arm_glibc_PTH_OPT.OBJ/javascript.o Linux3.19_arm_glibc_PTH_OPT.OBJ/list.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sign.o Linux3.19_arm_glibc_PTH_OPT.OBJ/util.o Linux3.19_arm_glibc_PTH_OPT.OBJ/verify.o Linux3.19_arm_glibc_PTH_OPT.OBJ/zip.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libjar.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc -lz
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/signtool /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/signtool'
cd signver; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/signver'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/signver.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  signver.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk7print.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  pk7print.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/signver -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  Linux3.19_arm_glibc_PTH_OPT.OBJ/signver.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk7print.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/signver /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/signver'
cd shlibsign; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/shlibsign'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/shlibsign.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  shlibsign.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/shlibsign -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss  Linux3.19_arm_glibc_PTH_OPT.OBJ/shlibsign.o -Wl,-z,relro  -Wl,-z,defs  -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/shlibsign /<<PKGBUILDDIR>>/mozilla/dist/bin
cd mangle; /usr/bin/make libs
make[5]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/shlibsign/mangle'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/mangle.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss  mangle.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/mangle -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss  Linux3.19_arm_glibc_PTH_OPT.OBJ/mangle.o -Wl,-z,relro  -Wl,-z,defs  -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/mangle /<<PKGBUILDDIR>>/mozilla/dist/bin
make[5]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/shlibsign/mangle'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/shlibsign'
cd smimetools; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/smimetools'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  cmsutil.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsutil -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsutil.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsutil /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/smimetools'
cd ssltap; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/ssltap'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssltap.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  ssltap.c
ssltap.c: In function 'print_ssl':
ssltap.c:1140:9: warning: variable 'l' set but not used [-Wunused-but-set-variable]
ssltap.c:1140:7: warning: variable 'i' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssltap -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.19_arm_glibc_PTH_OPT.OBJ/ssltap.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/ssltap /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/ssltap'
cd strsclnt; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/strsclnt'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/strsclnt.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  strsclnt.c
strsclnt.c: In function 'do_connects':
strsclnt.c:726:18: warning: variable 'result' set but not used [-Wunused-but-set-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/strsclnt -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.19_arm_glibc_PTH_OPT.OBJ/strsclnt.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/strsclnt /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/strsclnt'
cd symkeyutil; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/symkeyutil'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/symkeyutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  symkeyutil.c
symkeyutil.c: In function 'main':
symkeyutil.c:1018:31: warning: unused variable 'rv2' [-Wunused-variable]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/symkeyutil -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  Linux3.19_arm_glibc_PTH_OPT.OBJ/symkeyutil.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/symkeyutil /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/symkeyutil'
cd tests; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/tests'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/baddbdir.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  baddbdir.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/baddbdir -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.19_arm_glibc_PTH_OPT.OBJ/baddbdir.o \
	-Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/conflict.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  conflict.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/conflict -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.19_arm_glibc_PTH_OPT.OBJ/conflict.o \
	-Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/dertimetest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  dertimetest.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/dertimetest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.19_arm_glibc_PTH_OPT.OBJ/dertimetest.o \
	-Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/encodeinttest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  encodeinttest.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/encodeinttest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.19_arm_glibc_PTH_OPT.OBJ/encodeinttest.o \
	-Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/nonspr10.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  nonspr10.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/nonspr10 -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.19_arm_glibc_PTH_OPT.OBJ/nonspr10.o \
	-Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/remtest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  remtest.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/remtest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.19_arm_glibc_PTH_OPT.OBJ/remtest.o \
	-Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/secmodtest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  secmodtest.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/secmodtest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.19_arm_glibc_PTH_OPT.OBJ/secmodtest.o \
	-Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/baddbdir Linux3.19_arm_glibc_PTH_OPT.OBJ/conflict Linux3.19_arm_glibc_PTH_OPT.OBJ/dertimetest Linux3.19_arm_glibc_PTH_OPT.OBJ/encodeinttest Linux3.19_arm_glibc_PTH_OPT.OBJ/nonspr10 Linux3.19_arm_glibc_PTH_OPT.OBJ/remtest Linux3.19_arm_glibc_PTH_OPT.OBJ/secmodtest /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/tests'
cd tstclnt; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/tstclnt'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/tstclnt.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  tstclnt.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/tstclnt -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.19_arm_glibc_PTH_OPT.OBJ/tstclnt.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/tstclnt /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/tstclnt'
cd vfychain; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/vfychain'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/vfychain.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  vfychain.c
vfychain.c: In function 'configureRevocationParams':
vfychain.c:363:50: warning: 'revFlags' may be used uninitialized in this function [-Wuninitialized]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/vfychain -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  Linux3.19_arm_glibc_PTH_OPT.OBJ/vfychain.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/vfychain /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/vfychain'
cd vfyserv; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/vfyserv'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/vfyserv.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  vfyserv.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/vfyutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  vfyutil.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/vfyserv -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.19_arm_glibc_PTH_OPT.OBJ/vfyserv.o Linux3.19_arm_glibc_PTH_OPT.OBJ/vfyutil.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/vfyserv /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/vfyserv'
cd modutil; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/modutil'
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/modutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm  modutil.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm  pk11.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/instsec.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm  instsec.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/install.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm  install.c
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/installparse.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm  installparse.c
ytab.c: In function 'Pk11Install_yyparse':
ytab.c:219:5: warning: suggest parentheses around assignment used as truth value [-Wparentheses]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/install-ds.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm  install-ds.c
install-ds.c: In function 'Pk11Install_File_Generate':
install-ds.c:223:40: warning: comparison with string literal results in unspecified behavior [-Waddress]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/lex.Pk11Install_yy.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm  lex.Pk11Install_yy.c
lex.Pk11Install_yy.cpp:1060:13: warning: 'Pkcs11Install_yyunput' defined but not used [-Wunused-function]
lex.Pk11Install_yy.cpp:1106:12: warning: 'input' defined but not used [-Wunused-function]
gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/modutil -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DHAVE_STRERROR -DLINUX -Dlinux -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DUSE_UTIL_DIRECTLY -I/usr/include/nspr -I/<<PKGBUILDDIR>>/mozilla/dist/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm  Linux3.19_arm_glibc_PTH_OPT.OBJ/modutil.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11.o Linux3.19_arm_glibc_PTH_OPT.OBJ/instsec.o Linux3.19_arm_glibc_PTH_OPT.OBJ/install.o Linux3.19_arm_glibc_PTH_OPT.OBJ/installparse.o Linux3.19_arm_glibc_PTH_OPT.OBJ/install-ds.o Linux3.19_arm_glibc_PTH_OPT.OBJ/lex.Pk11Install_yy.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/mozilla/dist/lib/libjar.a /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/mozilla/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc -lz
../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/modutil /<<PKGBUILDDIR>>/mozilla/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd/modutil'
make[3]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss/cmd'
make[2]: Leaving directory `/<<PKGBUILDDIR>>/mozilla/security/nss'
make[1]: Leaving directory `/<<PKGBUILDDIR>>'
   debian/rules override_dh_auto_test
make[1]: Entering directory `/<<PKGBUILDDIR>>'
# Create .chk files for FIPS mode tests
# Run tests
export DIST=/<<PKGBUILDDIR>>/mozilla &&\
	export OBJDIR=dist            &&\
	export IP_ADDRESS=127.0.0.1   &&\
	export USE_IP=TRUE            &&\
	export NSS_CYCLES=standard    &&\
	cd /<<PKGBUILDDIR>>/mozilla/security/nss/tests        && ./all.sh
testdir is /<<PKGBUILDDIR>>/mozilla/tests_results/security
init.sh init: Creating /<<PKGBUILDDIR>>/mozilla/tests_results/security
********************************************
   Platform: dist
   Results: testbuildd.1
********************************************

init.sh init: Testing PATH .:/<<PKGBUILDDIR>>/mozilla/dist/bin:/<<PKGBUILDDIR>>/mozilla/dist/lib:/bin:/usr/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/sbin:/usr/games against LIB /<<PKGBUILDDIR>>/mozilla/dist/lib:
Running tests for cipher
TIMESTAMP cipher BEGIN: Mon Jun  6 22:38:29 UTC 2016
cipher.sh: Cipher Tests ===============================
cipher.sh: DES ECB Encrypt --------------------------------
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for des_ecb passed.
cipher.sh: #1: DES ECB Encrypt  - PASSED
cipher.sh: DES ECB Decrypt --------------------------------
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for des_ecb passed.
cipher.sh: #2: DES ECB Decrypt  - PASSED
cipher.sh: DES CBC Encrypt --------------------------------
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for des_cbc passed.
cipher.sh: #3: DES CBC Encrypt  - PASSED
cipher.sh: DES CBC Decrypt --------------------------------
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for des_cbc passed.
cipher.sh: #4: DES CBC Decrypt  - PASSED
cipher.sh: DES3 ECB Encrypt --------------------------------
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for des3_ecb passed.
cipher.sh: #5: DES3 ECB Encrypt  - PASSED
cipher.sh: DES3 ECB Decrypt --------------------------------
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for des3_ecb passed.
cipher.sh: #6: DES3 ECB Decrypt  - PASSED
cipher.sh: DES3 CBC Encrypt --------------------------------
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for des3_cbc passed.
cipher.sh: #7: DES3 CBC Encrypt  - PASSED
cipher.sh: DES3 CBC Decrypt --------------------------------
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for des3_cbc passed.
cipher.sh: #8: DES3 CBC Decrypt  - PASSED
cipher.sh: AES ECB Encrypt --------------------------------
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for aes_ecb passed.
cipher.sh: #9: AES ECB Encrypt  - PASSED
cipher.sh: AES ECB Decrypt --------------------------------
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for aes_ecb passed.
cipher.sh: #10: AES ECB Decrypt  - PASSED
cipher.sh: AES CBC Encrypt --------------------------------
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for aes_cbc passed.
cipher.sh: #11: AES CBC Encrypt  - PASSED
cipher.sh: AES CBC Decrypt --------------------------------
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for aes_cbc passed.
cipher.sh: #12: AES CBC Decrypt  - PASSED
cipher.sh: Camellia ECB Encrypt --------------------------------
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
cipher.sh: #13: Camellia ECB Encrypt  - PASSED
cipher.sh: Camellia ECB Decrypt --------------------------------
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
cipher.sh: #14: Camellia ECB Decrypt  - PASSED
cipher.sh: Camellia CBC Encrypt --------------------------------
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
cipher.sh: #15: Camellia CBC Encrypt  - PASSED
cipher.sh: Camellia CBC Decrypt --------------------------------
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
cipher.sh: #16: Camellia CBC Decrypt  - PASSED
cipher.sh: SEED ECB Encrypt --------------------------------
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for seed_ecb passed.
cipher.sh: #17: SEED ECB Encrypt  - PASSED
cipher.sh: SEED ECB Decrypt --------------------------------
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for seed_ecb passed.
cipher.sh: #18: SEED ECB Decrypt  - PASSED
cipher.sh: SEED CBC Encrypt --------------------------------
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for seed_cbc passed.
cipher.sh: #19: SEED CBC Encrypt  - PASSED
cipher.sh: SEED CBC Decrypt --------------------------------
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for seed_cbc passed.
cipher.sh: #20: SEED CBC Decrypt  - PASSED
cipher.sh: RC2 ECB Encrypt --------------------------------
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for rc2_ecb passed.
cipher.sh: #21: RC2 ECB Encrypt  - PASSED
cipher.sh: RC2 ECB Decrypt --------------------------------
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for rc2_ecb passed.
cipher.sh: #22: RC2 ECB Decrypt  - PASSED
cipher.sh: RC2 CBC Encrypt --------------------------------
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for rc2_cbc passed.
cipher.sh: #23: RC2 CBC Encrypt  - PASSED
cipher.sh: RC2 CBC Decrypt --------------------------------
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for rc2_cbc passed.
cipher.sh: #24: RC2 CBC Decrypt  - PASSED
cipher.sh: RC4 Encrypt --------------------------------
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
cipher.sh: #25: RC4 Encrypt  - PASSED
cipher.sh: RC4 Decrypt --------------------------------
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
cipher.sh: #26: RC4 Decrypt  - PASSED
cipher.sh: RSA Encrypt --------------------------------
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for rsa passed.
cipher.sh: #27: RSA Encrypt  - PASSED
cipher.sh: RSA Decrypt --------------------------------
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for rsa passed.
cipher.sh: #28: RSA Decrypt  - PASSED
cipher.sh: DSA Sign --------------------------------
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
cipher.sh: #29: DSA Sign  - PASSED
cipher.sh: DSA Verify --------------------------------
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
cipher.sh: #30: DSA Verify  - PASSED
cipher.sh: MD2 Hash --------------------------------
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for md2 passed.
cipher.sh: #31: MD2 Hash  - PASSED
cipher.sh: MD5 Hash --------------------------------
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for md5 passed.
cipher.sh: #32: MD5 Hash  - PASSED
cipher.sh: SHA1 Hash --------------------------------
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for sha1 passed.
cipher.sh: #33: SHA1 Hash  - PASSED
cipher.sh: SHA224 Hash --------------------------------
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
cipher.sh: #34: SHA224 Hash  - PASSED
cipher.sh: SHA256 Hash --------------------------------
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
cipher.sh: #35: SHA256 Hash  - PASSED
cipher.sh: SHA384 Hash --------------------------------
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
cipher.sh: #36: SHA384 Hash  - PASSED
cipher.sh: SHA512 Hash --------------------------------
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
cipher.sh: #37: SHA512 Hash  - PASSED
TIMESTAMP cipher END: Mon Jun  6 22:41:50 UTC 2016
Running tests for lowhash
TIMESTAMP lowhash BEGIN: Mon Jun  6 22:41:50 UTC 2016
lowhash.sh: Lowhash Tests ===============================
lowhashtest with fips mode=0
lowhashtest MD5
lowhash.sh: #38: lowhashtest with fips mode=0 for MD5  - PASSED
lowhashtest SHA1
lowhash.sh: #39: lowhashtest with fips mode=0 for SHA1  - PASSED
lowhashtest SHA224
lowhash.sh: #40: lowhashtest with fips mode=0 for SHA224  - PASSED
lowhashtest SHA256
lowhash.sh: #41: lowhashtest with fips mode=0 for SHA256  - PASSED
lowhashtest SHA384
lowhash.sh: #42: lowhashtest with fips mode=0 for SHA384  - PASSED
lowhashtest SHA512
lowhash.sh: #43: lowhashtest with fips mode=0 for SHA512  - PASSED
lowhashtest with fips mode=1
lowhashtest MD5
lowhash.sh: #44: lowhashtest with fips mode=1 for MD5  - PASSED
lowhashtest SHA1
lowhash.sh: #45: lowhashtest with fips mode=1 for SHA1  - PASSED
lowhashtest SHA224
lowhash.sh: #46: lowhashtest with fips mode=1 for SHA224  - PASSED
lowhashtest SHA256
lowhash.sh: #47: lowhashtest with fips mode=1 for SHA256  - PASSED
lowhashtest SHA384
lowhash.sh: #48: lowhashtest with fips mode=1 for SHA384  - PASSED
lowhashtest SHA512
lowhash.sh: #49: lowhashtest with fips mode=1 for SHA512  - PASSED
lowhash.sh done
TIMESTAMP lowhash END: Mon Jun  6 22:41:54 UTC 2016
Running tests for libpkix
TIMESTAMP libpkix BEGIN: Mon Jun  6 22:41:54 UTC 2016
TIMESTAMP libpkix END: Mon Jun  6 22:41:54 UTC 2016
Running tests for cert
TIMESTAMP cert BEGIN: Mon Jun  6 22:41:54 UTC 2016
cert.sh: Certutil and Crlutil Tests ===============================
cert.sh: #50: Looking for root certs module. - PASSED
cert.sh: Creating a CA Certificate TestCA ==========================
/<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/CA
cert.sh: Creating CA Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/CA -f ../tests.pw
cert.sh: #51: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/mozilla/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/CA

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #52: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert TestCA  --------------------------
certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #53: Creating CA Cert TestCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n TestCA -r -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/CA -o root.cert
cert.sh: #54: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate serverCA ==========================
/<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/serverCA
cert.sh: Creating CA Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/serverCA -f ../tests.pw
cert.sh: #55: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/mozilla/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/serverCA

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #56: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert serverCA  --------------------------
certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #57: Creating CA Cert serverCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n serverCA -r -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/serverCA -o root.cert
cert.sh: #58: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-1-serverCA ==========================
/<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/serverCA
cert.sh: Creating CA Cert chain-1-serverCA  --------------------------
certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #59: Creating CA Cert chain-1-serverCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-1-serverCA -r -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/serverCA -o root.cert
cert.sh: #60: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-2-serverCA ==========================
/<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/serverCA
cert.sh: Creating CA Cert chain-2-serverCA  --------------------------
certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #61: Creating CA Cert chain-2-serverCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-2-serverCA -r -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/serverCA -o root.cert
cert.sh: #62: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate clientCA ==========================
/<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/clientCA
cert.sh: Creating CA Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/clientCA -f ../tests.pw
cert.sh: #63: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/mozilla/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/clientCA

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #64: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert clientCA  --------------------------
certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #65: Creating CA Cert clientCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n clientCA -r -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/clientCA -o root.cert
cert.sh: #66: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-1-clientCA ==========================
/<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/clientCA
cert.sh: Creating CA Cert chain-1-clientCA  --------------------------
certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #67: Creating CA Cert chain-1-clientCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-1-clientCA -r -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/clientCA -o root.cert
cert.sh: #68: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-2-clientCA ==========================
/<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/clientCA
cert.sh: Creating CA Cert chain-2-clientCA  --------------------------
certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #69: Creating CA Cert chain-2-clientCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-2-clientCA -r -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/clientCA -o root.cert
cert.sh: #70: Exporting Root Cert - PASSED
cert.sh: Creating Certificates, issued by the last ===============
     of a chain of CA's which are not in the same database============
Server Cert
cert.sh: Initializing 127.0.0.1's Cert DB (ext.) --------------------------
certutil -N -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ext_server -f ../tests.pw
cert.sh: #71: Initializing 127.0.0.1's Cert DB (ext.) - PASSED
cert.sh: Loading root cert module to 127.0.0.1's Cert DB (ext.) --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/mozilla/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ext_server

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #72: Loading root cert module to 127.0.0.1's Cert DB (ext.) - PASSED
cert.sh: Generate Cert Request for 127.0.0.1 (ext) --------------------------
certutil -s "CN=127.0.0.1, E=127.0.0.1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ext_server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #73: Generate Cert Request for 127.0.0.1 (ext) - PASSED
cert.sh: Sign 127.0.0.1's Request (ext) --------------------------
certutil -C -c chain-2-serverCA -m 200 -v 60 -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/serverCA -i req -o 127.0.0.1.cert -f ../tests.pw
cert.sh: #74: Sign 127.0.0.1's Request (ext) - PASSED
cert.sh: Import 127.0.0.1's Cert  -t u,u,u (ext) --------------------------
certutil -A -n 127.0.0.1 -t u,u,u -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ext_server -f ../tests.pw -i 127.0.0.1.cert
cert.sh: #75: Import 127.0.0.1's Cert  -t u,u,u (ext) - PASSED
cert.sh: Import Client Root CA -t T,, for 127.0.0.1 (ext.) --------------------------
certutil -A -n clientCA -t T,, -f ../tests.pw -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ext_server -i /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/clientCA/clientCA.ca.cert
cert.sh: #76: Import Client Root CA -t T,, for 127.0.0.1 (ext.) - PASSED
Importing all the server's own CA chain into the servers DB
cert.sh: Import serverCA CA -t C,C,C for 127.0.0.1 (ext.)  --------------------------
certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ext_server -i /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/serverCA/serverCA.ca.cert
cert.sh: #77: Import serverCA CA -t C,C,C for 127.0.0.1 (ext.)  - PASSED
cert.sh: Import chain-1-serverCA CA -t u,u,u for 127.0.0.1 (ext.)  --------------------------
certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ext_server -i /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/serverCA/chain-1-serverCA.ca.cert
cert.sh: #78: Import chain-1-serverCA CA -t u,u,u for 127.0.0.1 (ext.)  - PASSED
cert.sh: Import chain-2-serverCA CA -t u,u,u for 127.0.0.1 (ext.)  --------------------------
certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ext_server -i /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/serverCA/chain-2-serverCA.ca.cert
cert.sh: #79: Import chain-2-serverCA CA -t u,u,u for 127.0.0.1 (ext.)  - PASSED
Client Cert
cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) --------------------------
certutil -N -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ext_client -f ../tests.pw
cert.sh: #80: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED
cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/mozilla/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ext_client

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #81: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED
cert.sh: Generate Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ext_client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #82: Generate Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's Request (ext) --------------------------
certutil -C -c chain-2-clientCA -m 300 -v 60 -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw
cert.sh: #83: Sign ExtendedSSLUser's Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser -t u,u,u -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ext_client -f ../tests.pw -i ExtendedSSLUser.cert
cert.sh: #84: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED
cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ext_client -i /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/serverCA/serverCA.ca.cert
cert.sh: #85: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED
Importing all the client's own CA chain into the servers DB
cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ext_client -i /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/clientCA/clientCA.ca.cert
cert.sh: #86: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ext_client -i /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/clientCA/chain-1-clientCA.ca.cert
cert.sh: #87: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ext_client -i /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/clientCA/chain-2-clientCA.ca.cert
cert.sh: #88: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh SUCCESS: EXT passed
cert.sh: Creating Client CA Issued Certificates ===============
cert.sh: Initializing TestUser's Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/client -f ../tests.pw
cert.sh: #89: Initializing TestUser's Cert DB - PASSED
cert.sh: Loading root cert module to TestUser's Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/mozilla/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/client

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #90: Loading root cert module to TestUser's Cert DB - PASSED
cert.sh: Import Root CA for TestUser --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/client -i ../CA/TestCA.ca.cert
cert.sh: #91: Import Root CA for TestUser - PASSED
cert.sh: Generate Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #92: Generate Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's Request --------------------------
certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw 
cert.sh: #93: Sign TestUser's Request - PASSED
cert.sh: Import TestUser's Cert --------------------------
certutil -A -n TestUser -t u,u,u -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser.cert
cert.sh: #94: Import TestUser's Cert - PASSED
cert.sh SUCCESS: TestUser's Cert Created
cert.sh: Creating Server CA Issued Certificate for \
             127.0.0.1 ------------------------------------
cert.sh: Initializing 127.0.0.1's Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/server -f ../tests.pw
cert.sh: #95: Initializing 127.0.0.1's Cert DB - PASSED
cert.sh: Loading root cert module to 127.0.0.1's Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/mozilla/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/server

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #96: Loading root cert module to 127.0.0.1's Cert DB - PASSED
cert.sh: Import Root CA for 127.0.0.1 --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/server -i ../CA/TestCA.ca.cert
cert.sh: #97: Import Root CA for 127.0.0.1 - PASSED
cert.sh: Generate Cert Request for 127.0.0.1 --------------------------
certutil -s "CN=127.0.0.1, E=127.0.0.1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #98: Generate Cert Request for 127.0.0.1 - PASSED
cert.sh: Sign 127.0.0.1's Request --------------------------
certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o 127.0.0.1.cert -f ../tests.pw 
cert.sh: #99: Sign 127.0.0.1's Request - PASSED
cert.sh: Import 127.0.0.1's Cert --------------------------
certutil -A -n 127.0.0.1 -t u,u,u -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/server -f ../tests.pw -i 127.0.0.1.cert
cert.sh: #100: Import 127.0.0.1's Cert - PASSED
cert.sh SUCCESS: 127.0.0.1's Cert Created
cert.sh: Creating Server CA Issued Certificate for \
             127.0.0.1-sni --------------------------------
cert.sh: Generate Cert Request for testbuildd-sni.(none) --------------------------
certutil -s "CN=testbuildd-sni.(none), E=testbuildd-sni.(none)@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #101: Generate Cert Request for testbuildd-sni.(none) - PASSED
cert.sh: Sign testbuildd-sni.(none)'s Request --------------------------
certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o testbuildd-sni.(none).cert -f ../tests.pw 
cert.sh: #102: Sign testbuildd-sni.(none)'s Request - PASSED
cert.sh: Import testbuildd-sni.(none)'s Cert --------------------------
certutil -A -n testbuildd-sni.(none) -t u,u,u -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/server -f ../tests.pw -i testbuildd-sni.(none).cert
cert.sh: #103: Import testbuildd-sni.(none)'s Cert - PASSED
cert.sh SUCCESS: testbuildd-sni.(none)'s Cert Created
cert.sh: Modify trust attributes of Root CA -t TC,TC,TC --------------------------
certutil -M -n TestCA -t TC,TC,TC -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/server -f ../tests.pw
cert.sh: #104: Modify trust attributes of Root CA -t TC,TC,TC - PASSED
cert.sh SUCCESS: SSL passed
cert.sh: Creating Client CA Issued Certificates ==============
cert.sh: Initializing Alice's Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/alicedir -f ../tests.pw
cert.sh: #105: Initializing Alice's Cert DB - PASSED
cert.sh: Loading root cert module to Alice's Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/mozilla/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/alicedir

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #106: Loading root cert module to Alice's Cert DB - PASSED
cert.sh: Import Root CA for Alice --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/alicedir -i ../CA/TestCA.ca.cert
cert.sh: #107: Import Root CA for Alice - PASSED
cert.sh: Generate Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/alicedir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #108: Generate Cert Request for Alice - PASSED
cert.sh: Sign Alice's Request --------------------------
certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw 
cert.sh: #109: Sign Alice's Request - PASSED
cert.sh: Import Alice's Cert --------------------------
certutil -A -n Alice -t u,u,u -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/alicedir -f ../tests.pw -i Alice.cert
cert.sh: #110: Import Alice's Cert - PASSED
cert.sh SUCCESS: Alice's Cert Created
cert.sh: Initializing Bob's Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/bobdir -f ../tests.pw
cert.sh: #111: Initializing Bob's Cert DB - PASSED
cert.sh: Loading root cert module to Bob's Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/mozilla/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/bobdir

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #112: Loading root cert module to Bob's Cert DB - PASSED
cert.sh: Import Root CA for Bob --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/bobdir -i ../CA/TestCA.ca.cert
cert.sh: #113: Import Root CA for Bob - PASSED
cert.sh: Generate Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/bobdir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #114: Generate Cert Request for Bob - PASSED
cert.sh: Sign Bob's Request --------------------------
certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw 
cert.sh: #115: Sign Bob's Request - PASSED
cert.sh: Import Bob's Cert --------------------------
certutil -A -n Bob -t u,u,u -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/bobdir -f ../tests.pw -i Bob.cert
cert.sh: #116: Import Bob's Cert - PASSED
cert.sh SUCCESS: Bob's Cert Created
cert.sh: Creating Dave's Certificate -------------------------
cert.sh: Initializing Dave's Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/dave -f ../tests.pw
cert.sh: #117: Initializing Dave's Cert DB - PASSED
cert.sh: Loading root cert module to Dave's Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/mozilla/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/dave

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #118: Loading root cert module to Dave's Cert DB - PASSED
cert.sh: Import Root CA for Dave --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/dave -i ../CA/TestCA.ca.cert
cert.sh: #119: Import Root CA for Dave - PASSED
cert.sh: Generate Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/dave -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #120: Generate Cert Request for Dave - PASSED
cert.sh: Sign Dave's Request --------------------------
certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw 
cert.sh: #121: Sign Dave's Request - PASSED
cert.sh: Import Dave's Cert --------------------------
certutil -A -n Dave -t u,u,u -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/dave -f ../tests.pw -i Dave.cert
cert.sh: #122: Import Dave's Cert - PASSED
cert.sh SUCCESS: Dave's Cert Created
cert.sh: Creating multiEmail's Certificate --------------------
cert.sh: Initializing Eve's Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/eve -f ../tests.pw
cert.sh: #123: Initializing Eve's Cert DB - PASSED
cert.sh: Loading root cert module to Eve's Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/mozilla/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/eve

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #124: Loading root cert module to Eve's Cert DB - PASSED
cert.sh: Import Root CA for Eve --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/eve -i ../CA/TestCA.ca.cert
cert.sh: #125: Import Root CA for Eve - PASSED
cert.sh: Generate Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/eve -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #126: Generate Cert Request for Eve - PASSED
cert.sh: Sign Eve's Request --------------------------
certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #127: Sign Eve's Request - PASSED
cert.sh: Import Eve's Cert --------------------------
certutil -A -n Eve -t u,u,u -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/eve -f ../tests.pw -i Eve.cert
cert.sh: #128: Import Eve's Cert - PASSED
cert.sh SUCCESS: Eve's Cert Created
cert.sh: Importing Certificates ==============================
cert.sh: Import Bob's cert into Alice's db --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert
cert.sh: #129: Import Bob's cert into Alice's db - PASSED
cert.sh: Import Dave's cert into Alice's DB --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert
cert.sh: #130: Import Dave's cert into Alice's DB - PASSED
cert.sh: Import Dave's cert into Bob's DB --------------------------
certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert
cert.sh: #131: Import Dave's cert into Bob's DB - PASSED
cert.sh: Import Eve's cert into Alice's DB --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert
cert.sh: #132: Import Eve's cert into Alice's DB - PASSED
cert.sh: Import Eve's cert into Bob's DB --------------------------
certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert
cert.sh: #133: Import Eve's cert into Bob's DB - PASSED
cert.sh SUCCESS: SMIME passed
cert.sh: Creating FIPS 140 DSA Certificates ==============
cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips -f ../tests.fipspw
cert.sh: #134: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED
cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/mozilla/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #135: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED
cert.sh: Enable FIPS mode on database -----------------------
modutil -dbdir /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips -fips true 

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
security library: invalid arguments.
ERROR: Unable to switch FIPS modes.
cert.sh: #136: Enable FIPS mode on database for FIPS PUB 140 Test Certificate (11)  - FAILED
cert.sh ERROR: Enable FIPS mode on database for FIPS PUB 140 Test Certificate failed 11
cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate --------------------------
certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@bogus.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise


Generating key.  This may take a few moments...

cert.sh: #137: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED
cert.sh SUCCESS: FIPS passed
cert.sh: Initializing TestExt's Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions -f ../tests.pw
cert.sh: #138: Initializing TestExt's Cert DB - PASSED
cert.sh: Loading root cert module to TestExt's Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/mozilla/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #139: Loading root cert module to TestExt's Cert DB - PASSED
cert.sh: Import Root CA for TestExt --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions -i ../CA/TestCA.ca.cert
cert.sh: #140: Import Root CA for TestExt - PASSED
cert.sh: Generate Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #141: Generate Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's Request --------------------------
certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw 
cert.sh: #142: Sign TestExt's Request - PASSED
cert.sh: Import TestExt's Cert --------------------------
certutil -A -n TestExt -t u,u,u -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions -f ../tests.pw -i TestExt.cert
cert.sh: #143: Import TestExt's Cert - PASSED
cert.sh SUCCESS: TestExt's Cert Created

certutil -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions -S -n TestExt1 -t u,u,u -o /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions/tempcert -s CN=TestExt1, E=TestExt1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions/test.args
certutil options:
0
1
2
3
4
5
6
10
n


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
certutil -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions -L -n TestExt1
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:a6:94:79:1e
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Mon Jun 06 22:42:19 2016
            Not After : Tue Sep 06 22:42:19 2016
        Subject: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d1:66:c0:35:76:a9:be:c1:34:9f:54:26:e9:f8:ef:93:
                    3d:fc:aa:82:e1:a9:cf:62:25:1c:53:8f:15:df:08:59:
                    9d:d4:4d:25:dd:93:b0:2f:89:80:9c:fb:d4:72:b5:4c:
                    33:fe:79:c5:d9:f2:f6:ae:01:0c:8c:be:a0:8b:33:51:
                    66:07:e7:30:79:d4:4d:c1:ff:52:7d:ea:1c:e0:c7:55:
                    0e:d8:f8:d9:5e:da:c2:e3:87:a0:d4:84:30:fb:79:39:
                    43:de:8c:53:71:81:f6:b7:d6:31:25:3b:8d:1b:4f:23:
                    5a:0b:39:66:3c:52:9b:71:b5:50:51:44:ca:ea:35:bf
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Key Usage
            Usages: Digital Signature
                    Non-Repudiation
                    Key Encipherment
                    Data Encipherment
                    Key Agreement
                    Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        08:9c:e8:fb:e0:28:8a:dd:7d:f1:e8:19:c7:56:f6:48:
        6c:21:01:7f:0c:9d:32:b6:89:f0:57:37:cc:eb:bc:ea:
        e5:1d:28:3f:63:c5:ae:6e:fd:c6:07:ea:68:d0:82:5d:
        22:90:1d:4b:28:a8:65:2f:f8:ef:5e:4c:3c:84:26:c3:
        15:61:7d:d7:c0:a4:ec:ee:d2:ad:36:ac:fe:5e:8f:0d:
        44:a8:d2:e7:ef:fd:d9:2f:c0:f6:87:24:13:be:7b:93:
        ae:e8:1a:fb:91:5e:8e:74:0e:60:95:29:7c:ec:f4:cd:
        c9:69:52:ec:98:bf:f2:6e:a2:5a:b9:04:5a:fb:59:51
    Fingerprint (MD5):
        92:CA:CE:71:F8:BB:1A:2F:10:A9:A7:64:C9:8D:F8:43
    Fingerprint (SHA1):
        09:CD:BE:AA:E7:03:E1:AB:64:D1:3C:94:33:EB:63:19:4D:A2:FF:B6

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #144: Certificate Key Usage Extension (1) - PASSED

certutil -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions -S -n TestExt2 -t u,u,u -o /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions/tempcert -s CN=TestExt2, E=TestExt2@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions/test.args
certutil options:
0
1
2
3
4
5
6
10
y


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
certutil -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions -L -n TestExt2
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:a6:94:79:22
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Mon Jun 06 22:42:24 2016
            Not After : Tue Sep 06 22:42:24 2016
        Subject: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ca:2d:6f:f4:16:67:36:98:26:ab:c5:3b:06:ea:95:93:
                    0f:32:34:1d:f8:4e:6d:57:ad:3c:52:49:ed:7f:d7:03:
                    bf:f0:8c:bd:5e:d4:ef:b0:d0:bb:7c:be:d5:f4:eb:09:
                    5e:24:26:98:ed:6c:e4:39:ca:b0:ed:45:ed:91:45:ca:
                    bd:ee:84:89:f3:ac:5c:7a:15:f9:81:6d:0e:28:33:06:
                    cc:85:02:62:c1:c4:bd:df:5b:34:26:e6:40:46:9c:ed:
                    95:d2:44:93:d7:d7:39:97:8b:e8:03:90:52:54:31:5a:
                    07:2e:64:7f:32:b1:8b:49:17:fa:e2:e8:97:6c:12:7f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Key Usage
            Critical: True
            Usages: Digital Signature
                    Non-Repudiation
                    Key Encipherment
                    Data Encipherment
                    Key Agreement
                    Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        2e:f3:7c:13:f4:1a:b0:63:f5:1f:35:32:ba:41:53:60:
        09:d0:aa:3f:f5:fd:f4:48:99:28:a7:66:ab:04:14:d7:
        56:4f:15:c6:35:3a:8b:32:eb:89:07:04:85:a4:0e:0c:
        38:8c:f1:b7:23:4f:03:60:89:ff:8f:1b:96:a6:a2:f7:
        a0:b3:57:bf:8b:0f:99:d0:e1:ca:98:05:d1:63:80:84:
        d4:fe:bc:9d:68:8f:43:3c:0b:38:7f:c7:0a:40:57:d8:
        6d:6b:01:5d:56:ab:b0:97:f1:2b:04:da:21:20:52:94:
        3c:76:0d:c1:e8:b3:2c:ff:ce:f1:c6:d6:08:a8:27:f0
    Fingerprint (MD5):
        01:03:2E:10:28:74:15:EF:3C:A9:44:7E:4C:6A:00:9A
    Fingerprint (SHA1):
        EA:DB:82:80:8F:FB:32:D1:56:0C:D4:29:51:B7:16:48:21:0F:CC:D8

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #145: Certificate Key Usage Extension (2) - PASSED

certutil -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions -S -n TestExt3 -t u,u,u -o /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions/tempcert -s CN=TestExt3, E=TestExt3@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions/test.args
certutil options:
y
-1
n


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
certutil -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions -L -n TestExt3
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:a6:94:79:28
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Mon Jun 06 22:42:25 2016
            Not After : Tue Sep 06 22:42:25 2016
        Subject: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ca:1a:f6:6e:be:58:36:a7:80:00:86:01:65:8b:5f:e3:
                    16:18:c3:72:f8:30:dd:66:b5:ee:5d:39:b8:cc:f8:2f:
                    bc:4d:3a:0f:5e:aa:1e:99:4a:f2:60:32:fa:04:da:cb:
                    a5:70:a2:01:a5:8b:c4:5b:30:d9:b1:20:a4:73:18:9b:
                    f6:9b:13:68:d5:32:07:8a:7f:e1:2c:12:a3:cd:84:61:
                    4a:17:2b:9f:9b:88:a6:ce:dc:b0:3e:29:44:98:3b:07:
                    f8:bf:09:4d:4e:12:ce:8c:d7:d8:81:2e:02:12:49:2b:
                    3a:2e:7d:2c:14:b7:29:59:cf:a5:32:72:1a:b2:6b:b5
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        93:ba:72:3e:39:e6:61:a7:92:6f:99:8b:37:a7:b9:75:
        c5:9d:8f:1b:13:95:5f:eb:98:8a:59:df:00:4a:2d:2f:
        03:2a:c2:11:b2:63:bb:bd:37:3e:3e:d2:fb:87:86:00:
        01:25:9f:07:79:37:17:99:fc:5c:a9:4a:8a:55:f2:17:
        ca:07:a4:62:5a:b7:88:fe:bb:eb:a7:39:be:83:68:24:
        71:96:c7:79:1a:20:5c:6b:85:04:0e:9a:5b:de:a1:5e:
        85:11:4b:b6:e3:0a:55:f9:76:bc:78:58:6b:65:25:7d:
        eb:c8:02:93:f7:d1:2e:46:7f:22:1f:fc:5a:34:26:98
    Fingerprint (MD5):
        4A:3D:C9:A7:7D:38:C3:AB:81:B4:79:20:E2:E8:A7:5A
    Fingerprint (SHA1):
        F2:B7:76:AF:B2:BA:B3:A8:CB:4A:A2:C2:9C:E5:48:2D:BE:47:97:B0

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #146: Certificate Basic Constraints Extension (3) - PASSED

certutil -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions -S -n TestExt4 -t u,u,u -o /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions/tempcert -s CN=TestExt4, E=TestExt4@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions/test.args
certutil options:
n
-1
y


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
certutil -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions -L -n TestExt4
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:a6:94:79:2a
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Mon Jun 06 22:42:26 2016
            Not After : Tue Sep 06 22:42:26 2016
        Subject: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    be:97:39:99:f3:1b:1b:60:30:bc:af:60:b1:78:17:dd:
                    ac:c8:cc:38:13:de:8a:dc:64:65:98:d0:af:56:86:62:
                    30:0c:27:7a:d0:2b:e9:69:40:aa:20:8f:6e:fb:92:25:
                    c0:c3:40:74:14:b0:7c:b3:56:d0:a5:b8:6f:87:e3:cb:
                    cd:92:16:da:96:11:b0:32:1c:4c:85:14:bf:8c:0f:b1:
                    a0:a1:b7:8d:75:13:52:86:41:c7:64:ad:ee:db:d6:b7:
                    d3:ae:33:de:a1:63:5b:8b:4b:0b:ae:53:16:70:dd:8b:
                    9c:31:65:8c:b2:d1:68:f1:ec:1f:9c:18:b4:03:3b:eb
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is not a CA.

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        25:20:cb:3a:b6:63:70:82:de:a0:ac:eb:dd:be:cf:b3:
        f3:67:9b:fa:6a:fb:51:78:26:c2:cd:09:7b:de:11:e0:
        5c:5b:8d:be:27:58:76:27:33:75:de:2c:25:25:d4:45:
        d8:91:25:0a:ef:7b:62:36:52:61:c8:56:f2:97:30:cd:
        36:0e:53:44:ca:fe:3e:d8:ff:08:5a:92:8f:0f:de:77:
        8c:dc:6d:46:78:92:3c:78:59:02:9f:25:78:5f:31:49:
        91:63:58:e8:a9:97:d3:63:29:0c:27:13:17:97:91:1f:
        a8:92:2f:79:a8:a5:9e:31:f0:bb:2d:7a:50:89:37:5d
    Fingerprint (MD5):
        A2:F0:F4:C8:40:25:B2:B8:D7:42:07:3A:AF:C5:05:01
    Fingerprint (SHA1):
        FE:BA:D3:BC:4F:71:F5:7E:D6:AC:8F:BD:87:FB:A4:A3:BB:22:95:FC

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #147: Certificate Basic Constraints Extension (4) - PASSED

certutil -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions -S -n TestExt5 -t u,u,u -o /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions/tempcert -s CN=TestExt5, E=TestExt5@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions/test.args
certutil options:
y
12341235123


y


Generating key.  This may take a few moments...

Enter value for the authKeyID extension [y/N]?
Enter value for the key identifier fields,enter to omit:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Enter value for the authCertSerial field, enter to omit:
Is this a critical extension [y/N]?
certutil -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions -L -n TestExt5
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:a6:94:79:2d
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Mon Jun 06 22:42:28 2016
            Not After : Tue Sep 06 22:42:28 2016
        Subject: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b1:6e:81:64:0e:6a:14:b3:ef:5c:24:fd:b8:c7:86:bb:
                    f5:f2:bc:34:24:53:38:59:b6:e3:66:e5:25:89:b7:13:
                    5d:65:72:b1:4c:4a:ba:0e:b3:06:33:44:15:43:a0:b6:
                    16:e1:7a:d9:86:68:09:9d:75:04:c6:c3:51:4a:ed:4b:
                    eb:0d:1e:0f:b5:f4:9c:5f:51:1b:2e:51:d0:b7:67:e9:
                    e7:ec:5c:21:a5:7f:18:71:32:92:d2:c0:33:00:ed:b3:
                    42:80:bc:96:4e:9c:88:b3:90:42:57:11:50:00:5a:51:
                    a7:0f:21:c7:0c:ee:63:e6:85:32:b0:ac:fb:47:41:ab
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Authority Key Identifier
            Critical: True
            Key ID:
                12341235123

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        a1:4b:b7:5d:43:80:e3:03:34:5c:69:28:de:c0:cf:07:
        a1:6d:cf:fc:a8:b3:32:ba:70:96:29:91:48:f7:bc:cb:
        89:50:03:2d:7f:5d:25:84:8b:a3:01:7f:3e:b2:a5:a9:
        a9:57:7a:69:45:4a:e4:ab:6d:3b:a3:02:c5:8f:96:69:
        85:89:3d:be:c5:87:75:ac:29:ab:40:43:40:e7:77:cb:
        42:62:e3:b9:6b:da:d4:d0:d0:0f:c5:9c:3d:6a:75:ef:
        0f:8e:0a:64:4d:0e:40:a3:63:f0:6a:9b:02:0d:2a:91:
        4a:af:4e:93:3e:7f:24:8c:65:1a:27:48:96:2d:29:55
    Fingerprint (MD5):
        93:77:27:03:F0:97:EA:FB:96:DE:6A:EB:11:79:EE:D2
    Fingerprint (SHA1):
        F1:CA:12:6F:73:10:E8:A4:FE:52:A9:BE:74:06:90:EF:43:3C:3F:6C

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #148: Certificate Authority Key Identifier Extension (5) - PASSED

certutil -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions -S -n TestExt6 -t u,u,u -o /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions/tempcert -s CN=TestExt6, E=TestExt6@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions/test.args
certutil options:
y

3
test.com

214123
y


Generating key.  This may take a few moments...

Enter value for the authKeyID extension [y/N]?
Enter value for the key identifier fields,enter to omit:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Enter value for the authCertSerial field, enter to omit:
Is this a critical extension [y/N]?
certutil -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions -L -n TestExt6
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:a6:94:79:31
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Mon Jun 06 22:42:30 2016
            Not After : Tue Sep 06 22:42:30 2016
        Subject: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c8:4a:bd:37:fc:03:c9:d4:cf:a3:aa:c7:d9:98:95:5d:
                    00:84:00:db:a1:4c:ee:b8:5b:b6:d9:34:20:7d:f0:39:
                    d3:9b:68:0c:15:5a:a7:bf:ad:c9:96:d3:78:9a:ec:d3:
                    f3:03:75:a7:c4:df:01:7b:fb:9b:be:a6:7b:36:fc:0f:
                    d6:5f:89:27:a5:ef:24:73:26:d6:2b:ef:77:8e:7b:db:
                    06:93:2b:2d:29:b4:47:e2:38:5e:8a:0a:00:58:fb:6d:
                    64:cc:ed:3f:7e:de:4d:ae:6f:3f:62:ee:05:1d:4e:a1:
                    f4:e6:e1:65:30:0b:48:4e:75:69:c4:34:29:da:38:df
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Authority Key Identifier
            Critical: True
            Issuer: 
                DNS name: "test.com"
            Serial Number:
                214123

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        16:8c:4e:8a:87:0e:d6:73:46:33:15:bd:09:72:62:dc:
        9c:94:0f:55:66:42:5b:18:dc:3b:69:6b:39:44:a9:e9:
        75:d9:64:7f:7b:f3:36:ed:fd:af:5e:2a:6d:e2:18:f0:
        5d:92:56:3c:c6:ae:ee:60:3e:3f:6e:22:42:4e:87:72:
        70:6a:ba:1b:4d:f0:85:d7:af:51:a6:d4:d3:c8:ba:8d:
        c1:78:46:0a:54:8a:59:f0:0d:3c:40:bb:e4:da:97:02:
        3f:85:65:46:7b:18:11:af:d7:53:74:dc:01:5b:fd:2d:
        8c:6c:18:44:89:4f:20:5e:55:68:31:14:4a:a3:78:ff
    Fingerprint (MD5):
        1F:72:E8:92:DE:AC:04:61:C1:78:95:C3:30:FB:AF:3D
    Fingerprint (SHA1):
        37:D6:16:D3:D0:53:E3:88:E1:ED:77:7B:0C:53:4D:FF:25:FD:6B:BA

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #149: Certificate Authority Key Identifier Extension (6) - PASSED

certutil -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions -S -n TestExt7 -t u,u,u -o /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions/tempcert -s CN=TestExt7, E=TestExt7@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions/test.args
certutil options:
1
2
rfc822@name.tld
3
test.com
8
1.2.3.4
9
OID.0.2.213
10
0
10
n
n


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
	1 - Full Name
	2 - Relative Name
	Any other number to finish
		Choice:  > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Select one of the following for the reason flags
	0 - unused
	1 - keyCompromise
	2 - caCompromise
	3 - affiliationChanged
	4 - superseded
	5 - cessationOfOperation
	6 - certificateHold
	Any other number to finish		Choice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
certutil -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions -L -n TestExt7
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:a6:94:79:34
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Mon Jun 06 22:42:31 2016
            Not After : Tue Sep 06 22:42:31 2016
        Subject: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:77:1a:79:8c:f9:b1:bc:08:15:84:29:06:64:13:8c:
                    a5:18:a6:45:bf:7c:ee:5e:3b:2d:fd:f2:ac:8a:4f:4c:
                    0a:bb:90:e9:33:ba:69:e7:b8:17:6d:f5:8e:c8:b3:d5:
                    76:f3:f2:e5:ac:ef:8e:90:0c:75:e3:05:ca:6b:fd:d7:
                    91:36:00:f5:72:6c:e8:2b:11:34:be:eb:d4:7c:36:0d:
                    e8:c2:a4:36:91:ec:36:3a:a4:bf:2a:0c:93:a6:05:d1:
                    12:95:14:ee:0f:c2:12:73:ad:94:a4:e4:8e:34:e3:d6:
                    29:a6:4c:8c:bf:e3:fa:25:74:ae:c0:da:e4:7b:07:9f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: CRL Distribution Points
            Distribution point:
                RFC822 Name: "rfc822@name.tld"
                DNS name: "test.com"
                IP Address:
                    87:07:31:2e:32:2e:33:2e:34
                Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51
                Reasons:
                    80
                    (7 least significant bits unused)

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        32:46:b2:a0:e9:dc:6a:32:74:d7:b8:3f:71:08:d9:eb:
        4f:6e:76:4b:ac:aa:0c:0c:ac:b3:61:db:0b:9f:1b:3b:
        8a:97:6a:fc:e5:81:b4:bd:dc:e3:3a:dc:33:06:f2:b1:
        72:de:f0:82:a2:26:fa:af:6f:16:85:fd:53:df:30:5a:
        eb:2b:72:1b:a7:d4:37:07:27:04:03:0d:92:f0:55:97:
        00:08:90:63:ae:9d:80:cd:79:9c:0c:23:e0:65:70:bf:
        7a:e2:e3:e9:c8:9f:80:3e:95:57:09:01:90:1a:8a:74:
        6f:60:7a:d8:21:00:25:f0:11:3e:ae:39:92:f4:b4:df
    Fingerprint (MD5):
        19:01:9D:B6:2C:75:F5:8E:17:87:BA:F9:20:81:8C:5C
    Fingerprint (SHA1):
        0D:F9:6B:4C:F6:02:6B:AC:BD:6E:C4:2F:40:F6:31:2E:FC:E3:F4:FF

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #150: CRL Distribution Points Extension (7) - PASSED

certutil -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions -S -n TestExt8 -t u,u,u -o /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions/tempcert -s CN=TestExt8, E=TestExt8@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions/test.args
certutil options:
2
SN=asdfsdf
4
3
test.com
10
n
n


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
	1 - Full Name
	2 - Relative Name
	Any other number to finish
		Choice:  > Enter the relative name: 

Select one of the following for the reason flags
	0 - unused
	1 - keyCompromise
	2 - caCompromise
	3 - affiliationChanged
	4 - superseded
	5 - cessationOfOperation
	6 - certificateHold
	Any other number to finish		Choice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
certutil -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions -L -n TestExt8
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:a6:94:79:36
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Mon Jun 06 22:42:33 2016
            Not After : Tue Sep 06 22:42:33 2016
        Subject: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ad:d9:ef:94:f1:15:14:0f:ef:9a:a7:2d:78:3f:57:09:
                    27:3a:fc:e9:b0:ae:39:05:f9:8f:ae:bd:99:26:1b:5b:
                    ac:25:4b:f7:6c:6e:f7:c7:11:7b:91:85:1f:34:77:1c:
                    dc:24:98:5a:6d:9b:4a:a6:80:df:e3:33:3d:10:be:b6:
                    96:0d:f6:19:34:47:81:f6:89:58:30:6b:ed:ad:4d:36:
                    21:d5:cf:87:b2:b9:0d:b2:e6:fa:cc:db:17:a9:cb:ed:
                    52:7f:58:47:0b:7d:c8:8a:e4:8e:b2:e2:f6:ad:67:cd:
                    48:b3:9b:71:1b:ba:7c:44:be:51:52:f4:5b:a4:3d:27
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: CRL Distribution Points
            Distribution point:
                RDN: "SN=asdfsdf"
                Reasons:
                    08
                    (7 least significant bits unused)
                CRL issuer: 
                    DNS name: "test.com"

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        18:64:a1:ae:e6:ad:90:63:76:cd:34:9a:13:06:55:b8:
        5b:47:a2:55:97:a5:44:2c:e8:ee:fd:59:09:e2:f2:5d:
        b4:70:26:d7:ae:89:b4:dd:15:8b:c3:49:30:4e:18:9b:
        81:3d:8d:1c:ed:24:41:23:e5:e2:2b:0c:1e:ed:1e:de:
        14:bb:0a:b4:1b:20:d2:35:e5:03:bd:5b:5f:66:26:e7:
        71:81:36:56:1e:86:1a:70:6b:b0:c7:8f:e5:29:b1:0d:
        22:0a:b3:6c:32:27:36:ad:22:c0:b0:a5:10:c1:3d:34:
        1d:1c:62:24:58:f4:65:fe:f1:a5:36:06:2e:64:54:b5
    Fingerprint (MD5):
        B6:EC:BC:CE:75:33:05:CB:31:CA:FC:7E:9A:DD:52:50
    Fingerprint (SHA1):
        EB:4A:C0:C8:B2:58:DD:AD:D3:D0:D2:BD:A5:6B:FE:E4:16:AB:33:9A

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #151: CRL Distribution Points Extension (8) - PASSED

certutil -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions -S -n TestExt9 -t u,u,u -o /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions/tempcert -s CN=TestExt9, E=TestExt9@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions/test.args
certutil options:
0
1
2
10
n


Generating key.  This may take a few moments...

		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Is this a critical extension [y/N]?
certutil -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions -L -n TestExt9
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:a6:94:79:3a
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Mon Jun 06 22:42:35 2016
            Not After : Tue Sep 06 22:42:35 2016
        Subject: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d6:63:5c:b0:c6:cc:d7:51:00:4a:37:30:2c:7a:ff:61:
                    d6:f6:7f:2a:c3:45:be:af:b7:e5:e5:ba:40:b0:47:2c:
                    f9:4b:8b:4e:48:57:af:b1:c7:00:10:cc:c2:4b:c8:bf:
                    a4:76:ff:11:76:a5:34:3e:d2:db:6a:9a:30:e3:ff:b7:
                    98:06:9a:ed:ab:a9:3b:ed:93:83:57:fa:a7:a5:5f:9d:
                    82:10:46:c4:7c:2f:4a:e9:e8:ba:2a:53:96:fb:64:00:
                    d2:ad:18:3a:64:b0:48:74:46:d2:c9:f5:e8:47:80:76:
                    80:78:2e:d9:82:d2:e0:af:76:94:32:c6:e6:73:0b:45
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL Client,SSL Server,S/MIME>

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        76:c1:3e:80:2f:85:60:75:ff:d4:64:19:62:e9:be:d2:
        87:52:42:b6:4b:cb:16:77:e0:ff:54:6d:b3:95:96:24:
        f6:d1:2f:72:eb:2f:4e:f8:50:d9:95:5e:9b:37:85:c5:
        70:90:f5:de:6d:d4:b4:0a:28:0d:2c:b5:c3:5a:32:2f:
        19:66:14:5c:62:fb:c1:1f:0d:fd:5c:6b:12:31:05:9c:
        0c:df:4d:d9:f6:50:05:ff:2d:3d:b9:6a:bd:0d:c4:d5:
        08:9f:f3:b2:7f:57:65:99:71:a5:9d:bc:37:a0:0c:06:
        35:a4:62:e6:c6:90:39:17:ca:a6:79:05:08:c8:c2:45
    Fingerprint (MD5):
        BD:EA:B4:7E:B6:95:29:76:53:54:BF:E8:CD:60:27:70
    Fingerprint (SHA1):
        84:D5:F6:C9:7B:DF:6E:DF:50:4A:03:79:55:92:DF:61:7D:9A:32:FC

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #152: Certificate Type Extension (9) - PASSED

certutil -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions -S -n TestExt10 -t u,u,u -o /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions/tempcert -s CN=TestExt10, E=TestExt10@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions/test.args
certutil options:
0
1
2
3
4
5
6
10
y


Generating key.  This may take a few moments...

		0 - Server Auth
		1 - Client Auth
		2 - Code Signing
		3 - Email Protection
		4 - Timestamp
		5 - OCSP Responder
		6 - Step-up
		7 - Microsoft Trust List Signing
		Other to finish
 > 		0 - Server Auth
		1 - Client Auth
		2 - Code Signing
		3 - Email Protection
		4 - Timestamp
		5 - OCSP Responder
		6 - Step-up
		7 - Microsoft Trust List Signing
		Other to finish
 > 		0 - Server Auth
		1 - Client Auth
		2 - Code Signing
		3 - Email Protection
		4 - Timestamp
		5 - OCSP Responder
		6 - Step-up
		7 - Microsoft Trust List Signing
		Other to finish
 > 		0 - Server Auth
		1 - Client Auth
		2 - Code Signing
		3 - Email Protection
		4 - Timestamp
		5 - OCSP Responder
		6 - Step-up
		7 - Microsoft Trust List Signing
		Other to finish
 > 		0 - Server Auth
		1 - Client Auth
		2 - Code Signing
		3 - Email Protection
		4 - Timestamp
		5 - OCSP Responder
		6 - Step-up
		7 - Microsoft Trust List Signing
		Other to finish
 > 		0 - Server Auth
		1 - Client Auth
		2 - Code Signing
		3 - Email Protection
		4 - Timestamp
		5 - OCSP Responder
		6 - Step-up
		7 - Microsoft Trust List Signing
		Other to finish
 > 		0 - Server Auth
		1 - Client Auth
		2 - Code Signing
		3 - Email Protection
		4 - Timestamp
		5 - OCSP Responder
		6 - Step-up
		7 - Microsoft Trust List Signing
		Other to finish
 > 		0 - Server Auth
		1 - Client Auth
		2 - Code Signing
		3 - Email Protection
		4 - Timestamp
		5 - OCSP Responder
		6 - Step-up
		7 - Microsoft Trust List Signing
		Other to finish
 > Is this a critical extension [y/N]?
certutil -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions -L -n TestExt10
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:a6:94:79:3d
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain Vi
            ew,ST=California,C=US"
        Validity:
            Not Before: Mon Jun 06 22:42:36 2016
            Not After : Tue Sep 06 22:42:36 2016
        Subject: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain V
            iew,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    f7:07:09:5e:d0:ab:2a:41:b3:e6:da:83:c7:c1:f7:ae:
                    d9:b2:fe:95:a8:fe:f5:a3:69:a4:60:72:d5:3c:01:08:
                    af:2f:98:29:aa:54:3d:07:88:3e:fd:4b:d1:e3:b4:a5:
                    99:25:42:81:9d:79:24:93:d5:95:6b:22:0c:45:38:5b:
                    9a:93:12:ba:79:b3:f6:f6:cc:5a:2f:e1:49:f7:e8:79:
                    21:1a:d5:ff:5b:e0:4c:58:fd:e8:14:56:91:ff:8a:b6:
                    9e:6e:dc:c7:aa:bc:71:eb:bb:bf:d5:f4:10:32:9a:24:
                    aa:72:e9:1d:70:b4:ae:3e:11:d5:6f:43:d9:bf:78:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Extended Key Usage
            Critical: True
                TLS Web Server Authentication Certificate
                TLS Web Client Authentication Certificate
                Code Signing Certificate
                E-Mail Protection Certificate
                Time Stamping Certifcate
                OCSP Responder Certificate
                Strong Crypto Export Approved

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        e5:28:87:d6:c5:25:2f:96:0a:10:14:aa:0f:34:a2:2e:
        c9:4a:9c:1c:6d:5e:c7:b8:05:f0:4b:62:32:56:24:39:
        94:8b:30:45:f5:80:c0:67:c5:ae:70:56:2e:d6:41:98:
        cf:c8:b4:d7:a3:5a:60:6c:87:e1:66:ac:24:6b:5c:8f:
        ad:6c:7a:a9:0a:44:a7:e0:ee:96:80:ad:6e:6a:2c:87:
        4a:d5:e6:15:7c:ce:5e:5e:f7:c9:69:da:04:ff:72:37:
        03:ed:46:3d:40:61:1d:82:77:6d:d0:8b:c2:7a:f8:97:
        b6:7f:f0:7f:6f:62:54:ff:2e:61:98:8b:cb:77:ce:61
    Fingerprint (MD5):
        2B:EC:44:58:F4:91:F8:92:16:E0:12:79:DD:AB:64:0C
    Fingerprint (SHA1):
        B9:C7:9A:1B:E3:CA:53:C0:D4:2A:B1:65:78:1A:91:4B:13:AE:EC:94

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #153: Extended Key Usage Extension (10) - PASSED

certutil -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions -S -n TestExt11 -t u,u,u -o /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions/tempcert -s CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions/test.args
certutil options:

1
2
3
4
5
6
10
n


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
certutil -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cert_extensions -L -n TestExt11
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:a6:94:79:40
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain Vi
            ew,ST=California,C=US"
        Validity:
            Not Before: Mon Jun 06 22:42:37 2016
            Not After : Tue Sep 06 22:42:37 2016
        Subject: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain V
            iew,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:63:d6:20:7b:21:52:99:2e:ed:03:b9:af:03:08:d6:
                    1d:1f:b4:4c:91:93:88:76:56:94:8e:7a:91:57:db:c9:
                    9b:26:45:8c:6e:bb:18:28:db:7d:2b:3f:bb:3e:64:2a:
                    fe:c6:de:af:6e:3d:87:d5:b4:c6:f7:ae:6c:92:38:fd:
                    c2:a0:82:4a:c8:80:99:c0:61:1b:48:e3:94:69:cc:7b:
                    d0:db:aa:7b:7f:c2:da:6c:56:b8:df:89:b6:b5:ee:68:
                    a1:82:8c:3a:52:1c:c7:8d:0f:94:1c:86:5e:a7:63:3b:
                    65:b5:a6:95:dc:b9:46:36:5c:b0:dc:f2:1c:dc:88:f9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Key Usage
            Usages: Non-Repudiation
                    Key Encipherment
                    Data Encipherment
                    Key Agreement
                    Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        94:23:8e:ff:0c:6a:b3:d1:d6:a5:f3:84:4c:9b:f7:3f:
        f3:e7:12:c0:8e:78:28:3b:45:a2:f1:1f:3c:2e:05:39:
        e3:92:03:0f:a7:f2:a7:e3:5f:45:37:f6:0d:b2:e0:42:
        cf:8a:ae:5b:69:f1:be:6f:1f:85:85:b9:04:7f:54:1e:
        2a:15:51:95:07:de:28:35:67:88:9b:50:a7:06:ff:dd:
        07:ae:0a:1e:32:61:ea:f1:8b:98:57:b0:50:ee:e5:49:
        f4:40:31:64:4f:02:61:5e:52:cd:f1:57:f5:c3:b2:fb:
        4a:c9:92:d5:9f:b1:72:9a:b8:ff:0c:1f:6e:ad:76:c0
    Fingerprint (MD5):
        E1:7C:75:0B:84:8A:1E:BC:5F:2F:02:26:AE:A5:44:B6
    Fingerprint (SHA1):
        4C:B2:45:CD:DF:0A:43:80:1F:98:FF:2F:E4:49:C1:E8:70:C2:8E:6C

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #154: Certificate Key Usage Extension (11) - PASSED
cert.sh: Create A Password Test Cert  ==============
cert.sh: Create A Password Test Ca  --------
cert.sh: Creating a CA Certificate PasswordCA ==========================
/<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/dbpass
cert.sh: Creating CA Cert DB --------------------------
certutil -s "CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/dbpass -f ../tests.pw
cert.sh: #155: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/mozilla/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/dbpass

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #156: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert PasswordCA  --------------------------
certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #157: Creating CA Cert PasswordCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n PasswordCA -r -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/dbpass -o root.cert
cert.sh: #158: Exporting Root Cert - PASSED
cert.sh: Changing password on Password Test Cert's Cert DB --------------------------
certutil -W -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/dbpass -f ../tests.pw -@ ../tests.fipspw
Password changed successfully.
cert.sh: #159: Changing password on Password Test Cert's Cert DB - PASSED
cert.sh: Generate Certificate for Password Test Cert with new password --------------------------
certutil -s "CN=Password Test Cert, E=password@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/dbpass -f ../tests.fipspw -z ../tests_noise


Generating key.  This may take a few moments...

cert.sh: #160: Generate Certificate for Password Test Cert with new password - PASSED
cert.sh SUCCESS: PASSWORD passed
cert.sh: Verify Certificate for Password Test Cert with new password --------------------------
certutil -V -n PasswordCert -u S -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/dbpass -f ../tests.fipspw
certutil: certificate is valid
cert.sh: #161: Verify Certificate for Password Test Cert with new password - PASSED
cert.sh: Creating Distrusted Certificate
cert.sh: Initializing Distrusted's Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/distrust -f ../tests.pw
cert.sh: #162: Initializing Distrusted's Cert DB - PASSED
cert.sh: Loading root cert module to Distrusted's Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/mozilla/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/distrust

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #163: Loading root cert module to Distrusted's Cert DB - PASSED
cert.sh: Import Root CA for Distrusted --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/distrust -i ../CA/TestCA.ca.cert
cert.sh: #164: Import Root CA for Distrusted - PASSED
cert.sh: Generate Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #165: Generate Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's Request --------------------------
certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw 
cert.sh: #166: Sign Distrusted's Request - PASSED
cert.sh: Import Distrusted's Cert --------------------------
certutil -A -n Distrusted -t u,u,u -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/distrust -f ../tests.pw -i Distrusted.cert
cert.sh: #167: Import Distrusted's Cert - PASSED
cert.sh SUCCESS: Distrusted's Cert Created
cert.sh: Mark CERT as unstrusted --------------------------
certutil -M -n Distrusted -t p,p,p -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/distrust -f ../tests.pw
cert.sh: #168: Mark CERT as unstrusted - PASSED
cert.sh: Creating Distrusted Intermediate
cert.sh: Creating a CA Certificate DistrustedCA ==========================
/<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/CA
cert.sh: Creating CA Cert DistrustedCA  --------------------------
certutil -s "CN=DistrustedCA, E=DistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #169: Creating CA Cert DistrustedCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n DistrustedCA -r -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/CA -o root.cert
cert.sh: #170: Exporting Root Cert - PASSED
cert.sh: Import Distrusted Intermediate --------------------------
certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/distrust -i ../CA/DistrustedCA.ca.cert
cert.sh: #171: Import Distrusted Intermediate - PASSED
cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA --------------------------
certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #172: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED
cp: `./req' and `/<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/CA/req' are the same file
cert.sh: Sign LeafChainedToDistrustedCA's Request --------------------------
certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw
cert.sh: #173: Sign LeafChainedToDistrustedCA's Request - PASSED
cert.sh: Import LeafChainedToDistrustedCA's Cert  -t u,u,u --------------------------
certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert
cert.sh: #174: Import LeafChainedToDistrustedCA's Cert  -t u,u,u - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server --------------------------
certutil -V -n LeafChainedToDistrustedCA -u V -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user.
cert.sh: #175: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client --------------------------
certutil -V -n LeafChainedToDistrustedCA -u C -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user.
cert.sh: #176: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer --------------------------
certutil -V -n LeafChainedToDistrustedCA -u S -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user.
cert.sh: #177: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient --------------------------
certutil -V -n LeafChainedToDistrustedCA -u R -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user.
cert.sh: #178: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder --------------------------
certutil -V -n LeafChainedToDistrustedCA -u O -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/distrust -f ../tests.pw
certutil: certificate is invalid: Certificate type not approved for application.
cert.sh: #179: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer --------------------------
certutil -V -n LeafChainedToDistrustedCA -u J -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/distrust -f ../tests.pw
certutil: certificate is invalid: Certificate type not approved for application.
cert.sh: #180: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED
cert.sh: Verify Distrusted Cert for SSL Server --------------------------
certutil -V -n Distrusted -u V -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #181: Verify Distrusted Cert for SSL Server - PASSED
cert.sh: Verify Distrusted Cert for SSL Client --------------------------
certutil -V -n Distrusted -u C -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #182: Verify Distrusted Cert for SSL Client - PASSED
cert.sh: Verify Distrusted Cert for Email signer --------------------------
certutil -V -n Distrusted -u S -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #183: Verify Distrusted Cert for Email signer - PASSED
cert.sh: Verify Distrusted Cert for Email recipient --------------------------
certutil -V -n Distrusted -u R -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #184: Verify Distrusted Cert for Email recipient - PASSED
cert.sh: Verify Distrusted Cert for OCSP responder --------------------------
certutil -V -n Distrusted -u O -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/distrust -f ../tests.pw
certutil: certificate is invalid: Certificate type not approved for application.
cert.sh: #185: Verify Distrusted Cert for OCSP responder - PASSED
cert.sh: Verify Distrusted Cert for Object Signer --------------------------
certutil -V -n Distrusted -u J -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #186: Verify Distrusted Cert for Object Signer - PASSED
cert.sh: OCSP response creation selftest
cert.sh: perform selftest --------------------------
ocspresp /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/serverCA serverCA chain-1-serverCA -f ../tests.pw
cert.sh: #187: perform selftest - PASSED
cert.sh: Creating Client CA Issued Certificates Range 40 - 52 ===
cert.sh: Generate Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #188: Generate Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's Request --------------------------
certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw 
cert.sh: #189: Sign TestUser40's Request - PASSED
cert.sh: Import TestUser40's Cert --------------------------
certutil -A -n TestUser40 -t u,u,u -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser40.cert
cert.sh: #190: Import TestUser40's Cert - PASSED
cert.sh SUCCESS: TestUser40's Cert Created
cert.sh: Generate Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #191: Generate Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's Request --------------------------
certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw 
cert.sh: #192: Sign TestUser41's Request - PASSED
cert.sh: Import TestUser41's Cert --------------------------
certutil -A -n TestUser41 -t u,u,u -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser41.cert
cert.sh: #193: Import TestUser41's Cert - PASSED
cert.sh SUCCESS: TestUser41's Cert Created
cert.sh: Generate Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #194: Generate Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's Request --------------------------
certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw 
cert.sh: #195: Sign TestUser42's Request - PASSED
cert.sh: Import TestUser42's Cert --------------------------
certutil -A -n TestUser42 -t u,u,u -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser42.cert
cert.sh: #196: Import TestUser42's Cert - PASSED
cert.sh SUCCESS: TestUser42's Cert Created
cert.sh: Generate Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #197: Generate Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's Request --------------------------
certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw 
cert.sh: #198: Sign TestUser43's Request - PASSED
cert.sh: Import TestUser43's Cert --------------------------
certutil -A -n TestUser43 -t u,u,u -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser43.cert
cert.sh: #199: Import TestUser43's Cert - PASSED
cert.sh SUCCESS: TestUser43's Cert Created
cert.sh: Generate Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #200: Generate Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's Request --------------------------
certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw 
cert.sh: #201: Sign TestUser44's Request - PASSED
cert.sh: Import TestUser44's Cert --------------------------
certutil -A -n TestUser44 -t u,u,u -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser44.cert
cert.sh: #202: Import TestUser44's Cert - PASSED
cert.sh SUCCESS: TestUser44's Cert Created
cert.sh: Generate Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #203: Generate Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's Request --------------------------
certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw 
cert.sh: #204: Sign TestUser45's Request - PASSED
cert.sh: Import TestUser45's Cert --------------------------
certutil -A -n TestUser45 -t u,u,u -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser45.cert
cert.sh: #205: Import TestUser45's Cert - PASSED
cert.sh SUCCESS: TestUser45's Cert Created
cert.sh: Generate Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #206: Generate Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's Request --------------------------
certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw 
cert.sh: #207: Sign TestUser46's Request - PASSED
cert.sh: Import TestUser46's Cert --------------------------
certutil -A -n TestUser46 -t u,u,u -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser46.cert
cert.sh: #208: Import TestUser46's Cert - PASSED
cert.sh SUCCESS: TestUser46's Cert Created
cert.sh: Generate Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #209: Generate Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's Request --------------------------
certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw 
cert.sh: #210: Sign TestUser47's Request - PASSED
cert.sh: Import TestUser47's Cert --------------------------
certutil -A -n TestUser47 -t u,u,u -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser47.cert
cert.sh: #211: Import TestUser47's Cert - PASSED
cert.sh SUCCESS: TestUser47's Cert Created
cert.sh: Generate Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #212: Generate Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's Request --------------------------
certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw 
cert.sh: #213: Sign TestUser48's Request - PASSED
cert.sh: Import TestUser48's Cert --------------------------
certutil -A -n TestUser48 -t u,u,u -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser48.cert
cert.sh: #214: Import TestUser48's Cert - PASSED
cert.sh SUCCESS: TestUser48's Cert Created
cert.sh: Generate Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #215: Generate Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's Request --------------------------
certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw 
cert.sh: #216: Sign TestUser49's Request - PASSED
cert.sh: Import TestUser49's Cert --------------------------
certutil -A -n TestUser49 -t u,u,u -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser49.cert
cert.sh: #217: Import TestUser49's Cert - PASSED
cert.sh SUCCESS: TestUser49's Cert Created
cert.sh: Generate Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #218: Generate Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's Request --------------------------
certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw 
cert.sh: #219: Sign TestUser50's Request - PASSED
cert.sh: Import TestUser50's Cert --------------------------
certutil -A -n TestUser50 -t u,u,u -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser50.cert
cert.sh: #220: Import TestUser50's Cert - PASSED
cert.sh SUCCESS: TestUser50's Cert Created
cert.sh: Generate Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #221: Generate Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's Request --------------------------
certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw 
cert.sh: #222: Sign TestUser51's Request - PASSED
cert.sh: Import TestUser51's Cert --------------------------
certutil -A -n TestUser51 -t u,u,u -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser51.cert
cert.sh: #223: Import TestUser51's Cert - PASSED
cert.sh SUCCESS: TestUser51's Cert Created
cert.sh: Generate Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #224: Generate Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's Request --------------------------
certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw 
cert.sh: #225: Sign TestUser52's Request - PASSED
cert.sh: Import TestUser52's Cert --------------------------
certutil -A -n TestUser52 -t u,u,u -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser52.cert
cert.sh: #226: Import TestUser52's Cert - PASSED
cert.sh SUCCESS: TestUser52's Cert Created
cert.sh: Creating CA CRL =====================================
cert.sh: Generating CRL for range 40-42 TestCA authority --------------------------
crlutil -q -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or
cert.sh: #227: Generating CRL for range 40-42 TestCA authority - PASSED
cert.sh: Modifying CA CRL by adding one more cert ============
cert.sh: Modify CRL by adding one more cert --------------------------
crlutil -q -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or
cert.sh: #228: Modify CRL by adding one more cert - PASSED
cert.sh: Modifying CA CRL by removing one cert ===============
cert.sh: Modify CRL by removing one cert --------------------------
crlutil -q -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1
cert.sh: #229: Modify CRL by removing one cert - PASSED
cert.sh: Creating CA CRL for groups 1 and 2  ===============
cert.sh: Creating CRL for groups 1 and 2 --------------------------
crlutil -q -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42
cert.sh: #230: Creating CRL for groups 1 and 2 - PASSED
cert.sh: Creating CA CRL for groups 1, 2 and 3  ===============
cert.sh: Creating CRL for groups 1, 2 and 3 --------------------------
crlutil -q -d /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48
cert.sh: #231: Creating CRL for groups 1, 2 and 3 - PASSED
cert.sh: Importing Server CA Issued CRL for certs  trough 52
cert.sh: Importing CRL for groups 1 --------------------------
crlutil -q -D -n TestCA -f ../tests.pw -d ../server
crlutil: could not find TestCA's CRL: No matching CRL was found.
crlutil: could not find the issuer TestCA's CRL: No matching CRL was found.
cert.sh: #232: Importing CRL for groups 1 - PASSED
cert.sh: Importing CRL for groups 1 --------------------------
crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server
cert.sh: #233: Importing CRL for groups 1 - PASSED
cert.sh SUCCESS: SSL CRL prep passed
cert.sh cert.sh: finished cert.sh
TIMESTAMP cert END: Mon Jun  6 22:43:13 UTC 2016
Running tests for dbtests
TIMESTAMP dbtests BEGIN: Mon Jun  6 22:43:13 UTC 2016
dbtests.sh: CERT and Key DB Tests ===============================

---------------------------------------------------------------
| test opening the database read/write in a nonexisting directory
---------------------------------------------------------------
certutil: function failed: The certificate/key database is in an old, unsupported format.
dbtests.sh: #234: Certutil didn't work in a nonexisting dir 255 - PASSED
dbdir selected is ./non_existent_dir

ERROR: Directory "./non_existent_dir" does not exist.
dbtest: function failed: The certificate/key database is in an old, unsupported format.
dbtests.sh: #235: Dbtest readonly didn't work in a nonexisting dir 46 - PASSED

---------------------------------------------------------------
| test force opening the database in a nonexisting directory
---------------------------------------------------------------
dbdir selected is ./non_existent_dir

ERROR: Directory "./non_existent_dir" does not exist.
dbtests.sh: #236: Dbtest force succeeded in a nonexisting dir 0 - PASSED

---------------------------------------------------------------
| test opening the database readonly in an empty directory
---------------------------------------------------------------
tstclnt: error looking up host: A directory lookup on a network address has failed
dbtests.sh: #237: Tstclnt didn't work in an empty dir 1 - PASSED
dbdir selected is /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/emptydir

database checked is /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/emptydir/secmod.db
ERROR: File "/<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/emptydir/secmod.db" does not exist.
database checked is /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/emptydir/cert8.db
ERROR: File "/<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/emptydir/cert8.db" does not exist.
database checked is /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/emptydir/key3.db
ERROR: File "/<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/emptydir/key3.db" does not exist.
dbtest: function failed: The certificate/key database is in an old, unsupported format.
dbtests.sh: #238: Dbtest readonly didn't work in an empty dir 46 - PASSED
dbdir selected is /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/emptydir

dbtests.sh: #239: Dbtest logout after empty DB Init has key - PASSED
dbdir selected is /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/emptydir

dbtests.sh: #240: Dbtest password DB Init maintains needlogin state - PASSED
certutil: could not find certificate named "xxxx": security library: bad database.
dbtests.sh: #241: Certutil didn't work in an empty dir 255 - PASSED

---------------------------------------------------------------
| test force opening the database  readonly in a empty directory
---------------------------------------------------------------
dbdir selected is /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/emptydir

database checked is /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/emptydir/secmod.db
ERROR: File "/<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/emptydir/secmod.db" does not exist.
database checked is /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/emptydir/cert8.db
ERROR: File "/<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/emptydir/cert8.db" does not exist.
database checked is /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/emptydir/key3.db
ERROR: File "/<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/emptydir/key3.db" does not exist.
dbtests.sh: #242: Dbtest force readonly succeeded in an empty dir 0 - PASSED

---------------------------------------------------------------
| test opening the database r/w in a readonly directory
---------------------------------------------------------------
dbdir selected is /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ronlydir

ERROR: Directory "/<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ronlydir" is not writeable.
database checked is /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ronlydir/secmod.db
ERROR: File "/<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ronlydir/secmod.db" is not writeable.
database checked is /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ronlydir/cert8.db
ERROR: File "/<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ronlydir/cert8.db" is not writeable.
database checked is /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ronlydir/key3.db
ERROR: File "/<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ronlydir/key3.db" is not writeable.
dbtest: function failed: The certificate/key database is in an old, unsupported format.
dbtests.sh: #243: Dbtest r/w didn't work in an readonly dir 46 - PASSED
certutil: could not find certificate named "TestUser": security library: bad database.
dbtests.sh: #244: Certutil didn't work in an readonly dir 255 - PASSED

---------------------------------------------------------------
| test opening the database ronly in a readonly directory
---------------------------------------------------------------
dbdir selected is /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ronlydir

database checked is /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ronlydir/secmod.db
database checked is /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ronlydir/cert8.db
database checked is /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ronlydir/key3.db
dbtests.sh: #245: Dbtest readonly succeeded in a readonly dir 0 - PASSED

---------------------------------------------------------------
| test force opening the database  r/w in a readonly directory
---------------------------------------------------------------
dbdir selected is /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ronlydir

ERROR: Directory "/<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ronlydir" is not writeable.
database checked is /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ronlydir/secmod.db
ERROR: File "/<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ronlydir/secmod.db" is not writeable.
database checked is /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ronlydir/cert8.db
ERROR: File "/<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ronlydir/cert8.db" is not writeable.
database checked is /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ronlydir/key3.db
ERROR: File "/<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ronlydir/key3.db" is not writeable.
dbtests.sh: #246: Dbtest force succeeded in a readonly dir 0 - PASSED

---------------------------------------------------------------
| ls -l /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ronlydir
---------------------------------------------------------------
dr-xr-xr-x 1 buildd buildd    80 Jun  6 22:43 /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ronlydir
-r--r----- 1 buildd buildd   609 Jun  6 22:43 /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ronlydir/TestUser.cert
-r-------- 1 buildd buildd 65536 Jun  6 22:43 /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ronlydir/cert8.db
-r-------- 1 buildd buildd 32768 Jun  6 22:43 /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ronlydir/key3.db
-r--r----- 1 buildd buildd   457 Jun  6 22:43 /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ronlydir/req
-r-------- 1 buildd buildd 16384 Jun  6 22:43 /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ronlydir/secmod.db

---------------------------------------------------------------
| test creating a new cert with a conflicting nickname
---------------------------------------------------------------
/<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/conflictdir
certutil: could not add certificate to token or database: Error adding certificate to database.
dbtests.sh: #247: Nicknane conflict test, could not import conflict nickname 255 - PASSED

---------------------------------------------------------------
| test importing an old cert to a conflicting nickname
---------------------------------------------------------------
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 40 (0x28)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:12 2016
            Not After : Sun Jun 06 22:42:12 2021
        Subject: "CN=Bob,E=Bob@bogus.com,O=BOGUS NSS,L=Mountain View,ST=Calif
            ornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b2:52:c2:b9:a5:93:cf:4f:44:a6:f9:e5:0f:b2:06:ef:
                    a3:2a:7a:fd:23:9d:3d:48:51:fc:a7:a8:f0:ea:a2:c1:
                    3a:c6:b2:0f:c9:38:58:e4:d2:f9:9e:bf:af:d0:70:6a:
                    e7:a0:b1:cf:94:df:32:cd:43:9b:ec:36:c4:e5:db:56:
                    54:39:5f:13:63:d4:ad:84:71:b6:35:3f:d3:d9:61:b5:
                    55:7d:13:28:0c:e1:1d:01:7a:1e:ca:5f:40:44:9b:8e:
                    9e:4a:26:96:ba:16:36:f5:06:46:bc:73:70:4d:67:3f:
                    82:51:96:b0:f6:36:d7:35:41:78:56:2a:77:04:da:53
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        0f:59:68:0c:fc:8c:e0:15:78:eb:6e:af:9b:4a:0f:b6:
        1f:c9:bd:41:a6:21:00:c7:62:aa:28:be:dd:94:c9:28:
        ad:d7:3e:92:f2:04:c4:7c:c4:02:77:89:41:53:83:31:
        0e:d6:db:d1:21:5e:ab:6c:11:02:b1:b4:cf:22:03:2d:
        df:e0:85:b2:ee:31:6f:2f:d9:da:02:03:7c:f9:94:af:
        dc:8e:3c:5d:70:a9:ca:e0:a5:39:87:ef:f2:50:06:bd:
        53:3d:fe:c4:55:bf:eb:9e:d3:68:f3:c8:e9:51:be:91:
        66:ae:8e:3a:65:69:12:27:63:2e:df:d8:d9:51:53:44
    Fingerprint (MD5):
        18:15:40:3C:B3:57:5A:F1:64:DE:4B:A7:93:FA:01:F8
    Fingerprint (SHA1):
        88:C9:05:E6:36:9F:E6:E6:73:B0:CC:6B:31:A6:38:5F:65:44:9A:5D

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

dbtests.sh: #248: Nicknane conflict test-setting nickname conflict was correctly rejected - PASSED
TIMESTAMP dbtests END: Mon Jun  6 22:43:14 UTC 2016
Running tests for tools
TIMESTAMP tools BEGIN: Mon Jun  6 22:43:15 UTC 2016
tools.sh: Tools Tests ===============================
tools.sh: Exporting Alice's email cert & key - default ciphers
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #249: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                50:0c:64:14:c1:dc:ab:58:14:70:f4:b7:f5:aa:0f:e0
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

tools.sh: #250: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #251: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #252: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
        Parameters:
            Salt:
                bc:0e:94:de:5b:19:c3:85:fe:67:b7:59:2b:be:ef:a2
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

tools.sh: #253: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #254: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #255: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
        Parameters:
            Salt:
                f7:a3:fb:f7:3a:a7:fb:f7:4a:81:9e:40:f7:e7:3a:44
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

tools.sh: #256: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #257: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #258: Exporting with [RC2-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
        Parameters:
            Salt:
                ff:49:3b:5f:92:08:40:00:61:c0:dc:dc:02:aa:83:bf
            Iteration Count: 2000 (0x7d0)
tools.sh: #259: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #260: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #261: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                90:b0:81:0a:6d:74:85:71:cf:19:64:f5:01:59:cf:b0
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

tools.sh: #262: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #263: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #264: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                28:38:3c:b0:1a:82:22:32:d2:0f:20:50:84:e0:12:7d
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

tools.sh: #265: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #266: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #267: Exporting with [DES-EDE3-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                ae:64:2d:88:78:2b:73:c2:88:0a:8a:c7:3a:c9:95:7c
            Iteration Count: 2000 (0x7d0)
tools.sh: #268: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #269: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #270: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        93:bf:fe:b3:07:5a:da:64:67:89:ec:63:99:01:fe:1d
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-128-CBC
                Args:
                    04:10:9a:6c:80:43:39:a4:47:f6:b4:8c:98:9d:06:5e:
                    31:d6
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

tools.sh: #271: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #272: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #273: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        a0:51:ce:fa:19:b0:b3:c0:26:25:85:93:85:65:a9:a0
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-128-CBC
                Args:
                    04:10:46:04:67:4f:24:3a:6c:e2:d4:30:95:7d:be:ca:
                    50:dc
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

tools.sh: #274: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #275: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #276: Exporting with [AES-128-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        f7:f9:f2:95:d8:dd:91:c7:3c:b5:03:23:18:00:8e:c5
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-128-CBC
                Args:
                    04:10:0f:09:4d:5a:44:62:ad:16:81:9f:90:06:ce:45:
                    c6:8e
tools.sh: #277: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #278: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #279: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        1f:84:5b:16:32:d4:4a:1f:ea:7a:82:5e:82:c3:a1:c5
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-192-CBC
                Args:
                    04:10:dd:bd:48:60:93:ee:c2:a1:ab:24:b7:00:73:38:
                    c3:ca
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

tools.sh: #280: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #281: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #282: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        91:3a:d7:81:2c:28:5e:7c:74:2d:89:24:21:7c:b0:16
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-192-CBC
                Args:
                    04:10:2f:9c:50:14:66:27:98:a1:33:fe:3c:3c:61:82:
                    b6:7a
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

tools.sh: #283: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #284: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #285: Exporting with [AES-192-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        f1:f8:b1:f8:ad:6a:02:f8:9b:7f:81:75:48:0e:1e:d9
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-192-CBC
                Args:
                    04:10:16:f7:09:46:c4:68:d9:83:51:b5:fe:82:46:80:
                    0f:ca
tools.sh: #286: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #287: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #288: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        02:01:3d:e2:58:07:0e:2e:01:c1:40:f5:86:2c:30:ce
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-256-CBC
                Args:
                    04:10:d7:c1:c9:40:9c:0d:72:c9:bf:56:86:cc:7a:51:
                    15:38
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

tools.sh: #289: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #290: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #291: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        3d:eb:03:4a:58:a7:76:89:98:ec:57:eb:5d:9a:dc:8c
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-256-CBC
                Args:
                    04:10:9b:3c:d7:e3:80:50:3b:80:55:8f:81:f2:4a:57:
                    0b:62
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

tools.sh: #292: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #293: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #294: Exporting with [AES-256-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        70:db:a1:af:6b:ec:d4:d1:ab:f5:c0:9a:c1:36:7a:59
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-256-CBC
                Args:
                    04:10:99:99:04:00:ab:de:cc:d9:2c:55:93:04:1d:6c:
                    5b:cf
tools.sh: #295: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #296: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #297: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        45:03:8a:44:b5:0b:0b:a0:16:57:e9:12:ac:72:85:98
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-128-CBC
                Args:
                    04:10:e2:0f:ac:4e:cd:35:b0:96:29:15:d0:25:d5:54:
                    75:bd
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

tools.sh: #298: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #299: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #300: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        5a:67:ff:ad:7b:fb:9c:09:1c:b5:cb:85:21:80:b1:91
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-128-CBC
                Args:
                    04:10:34:48:25:c4:02:89:0d:32:80:e1:38:b5:0e:6e:
                    20:5b
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

tools.sh: #301: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #302: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #303: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        38:3b:51:86:e7:93:50:71:16:9b:19:96:4b:3e:d5:6a
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-128-CBC
                Args:
                    04:10:1d:c1:88:4c:65:38:37:28:1d:d0:79:9a:79:b5:
                    39:2a
tools.sh: #304: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #305: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #306: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        21:26:e4:8e:af:b0:ab:81:fb:6f:6e:18:a6:7a:5a:fe
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-192-CBC
                Args:
                    04:10:ee:14:d5:28:eb:2a:11:15:27:75:3b:d0:f6:9b:
                    a4:62
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

tools.sh: #307: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #308: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #309: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        cc:06:e3:25:d2:f4:e8:26:be:0a:74:c1:dc:72:f4:4f
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-192-CBC
                Args:
                    04:10:69:33:e2:74:fd:76:e8:0c:e2:47:f0:4d:78:cf:
                    84:41
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

tools.sh: #310: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #311: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #312: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        cf:79:44:61:88:76:fd:ed:c5:f2:3f:15:b2:fa:49:a8
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-192-CBC
                Args:
                    04:10:5e:3e:ae:58:e5:9e:cf:44:66:21:f9:ec:53:a8:
                    36:2e
tools.sh: #313: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #314: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #315: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        74:42:d4:f7:93:f0:09:72:df:72:9c:74:ba:31:3e:ec
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-256-CBC
                Args:
                    04:10:8d:4f:9e:ed:7e:a4:25:ab:92:75:1d:b5:b4:a8:
                    ea:67
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

tools.sh: #316: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #317: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #318: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        d2:7c:9a:be:b2:ea:11:65:d5:bc:55:69:aa:b3:f6:12
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-256-CBC
                Args:
                    04:10:03:2f:ed:02:3a:b6:66:30:6a:fd:f3:63:9d:31:
                    1f:a8
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

tools.sh: #319: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #320: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #321: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        fe:6a:82:4d:2e:4e:ec:f2:16:b8:d9:f1:77:73:d9:4f
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-256-CBC
                Args:
                    04:10:b4:af:0d:83:96:74:7e:73:9d:04:09:fb:3a:c3:
                    dd:c1
tools.sh: #322: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #323: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #324: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                9c:0a:c2:48:54:70:45:f2:e5:60:dd:cf:4a:48:2b:81
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

tools.sh: #325: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #326: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #327: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                d0:38:a9:55:2b:44:66:8b:49:0e:d2:5f:68:6f:8f:96
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

tools.sh: #328: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #329: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #330: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                5f:2b:48:d6:73:30:13:c3:31:7c:af:f3:61:5e:60:af
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

tools.sh: #331: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #332: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #333: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                34:57:2e:61:ab:91:c0:85:3a:56:e5:33:58:7f:b6:78
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

tools.sh: #334: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #335: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #336: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                1e:79:5f:f3:1b:c1:00:75:8d:46:f6:d5:4d:28:13:fa
            Iteration Count: 2000 (0x7d0)
tools.sh: #337: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #338: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #339: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                3d:e4:b1:6e:d1:e4:8b:9d:4f:6f:bf:fb:c9:9e:ea:b1
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

tools.sh: #340: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #341: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #342: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                c1:63:8b:04:89:08:3a:93:4e:fa:fd:4b:c8:be:fa:d1
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

tools.sh: #343: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #344: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #345: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                5c:7c:51:87:99:1c:ad:f0:9c:7d:07:8e:a2:f3:f2:4c
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

tools.sh: #346: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #347: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #348: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                a8:d4:1f:fb:ca:38:cc:a8:df:32:8a:74:3a:61:e7:ba
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

tools.sh: #349: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #350: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #351: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                36:7f:08:d9:38:61:de:45:19:52:ab:a7:4b:e8:94:9e
            Iteration Count: 2000 (0x7d0)
tools.sh: #352: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #353: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #354: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                bc:9c:1b:f0:18:2c:f8:07:a2:07:a0:94:ef:78:11:ef
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

tools.sh: #355: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #356: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #357: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                a0:7a:3c:28:b6:6d:46:46:67:52:af:b4:d0:27:87:5e
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

tools.sh: #358: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #359: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #360: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                a5:8f:7a:3b:67:1d:44:a7:ca:65:ee:61:80:85:0f:85
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

tools.sh: #361: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #362: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #363: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                ba:1e:89:eb:7f:d8:09:8d:b4:8b:30:2a:45:69:47:7c
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

tools.sh: #364: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #365: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #366: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                ac:2b:a1:a5:eb:ae:0e:2d:6b:04:02:be:aa:5f:d1:45
            Iteration Count: 2000 (0x7d0)
tools.sh: #367: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #368: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #369: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                12:15:fa:d1:c8:0c:b4:fd:f9:e3:7b:62:c2:e1:87:bd
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

tools.sh: #370: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #371: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #372: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                98:16:1b:c3:46:42:01:6e:63:a4:b6:33:3d:dd:66:87
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

tools.sh: #373: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #374: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #375: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                0f:b2:90:58:6c:f1:e2:05:2c:06:e6:e8:5c:be:17:23
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

tools.sh: #376: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #377: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #378: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                a4:f4:f5:e3:a2:08:a2:ed:13:95:05:34:2d:c1:1c:da
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

tools.sh: #379: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #380: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:null]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #381: Exporting with [default:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                1e:e9:4b:dc:6a:ba:9a:44:0e:d3:26:ce:8e:59:f7:7a
            Iteration Count: 2000 (0x7d0)
tools.sh: #382: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #383: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #384: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                cf:09:4f:60:c6:3f:31:33:60:ca:2b:1f:79:46:46:7f
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

tools.sh: #385: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #386: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #387: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                2e:46:f8:ae:08:ac:24:34:c5:08:bf:d1:0f:f2:a0:ed
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

tools.sh: #388: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #389: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #390: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                28:fe:e6:58:88:29:a5:82:8d:1f:62:27:9d:18:fd:fa
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

tools.sh: #391: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #392: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #393: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                3b:dc:51:f8:7b:14:9c:17:af:17:70:5c:a4:cf:e6:56
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

tools.sh: #394: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #395: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #396: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                75:de:6f:d0:db:ed:3f:87:b8:d0:22:3d:77:62:65:05
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

tools.sh: #397: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #398: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #399: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                20:63:cd:59:89:ff:9b:cd:97:5a:1f:b1:a1:dd:fb:7c
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

tools.sh: #400: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #401: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #402: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                bb:b6:f7:88:31:44:7b:3d:69:62:44:15:3a:5e:01:59
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

tools.sh: #403: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #404: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #405: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                df:34:f3:92:20:b3:23:43:45:5e:f3:20:76:e6:ae:eb
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

tools.sh: #406: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #407: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #408: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                23:e4:9f:ee:26:b2:95:8a:c8:09:d6:52:17:b4:ae:f7
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

tools.sh: #409: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #410: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #411: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                40:14:69:e2:c6:f5:b3:08:39:a8:7d:4a:45:f8:70:5c
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:41:55 2016
            Not After : Sun Jun 06 22:41:55 2066
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f3:16:ca:db:df:73:57:f5:8f:5f:ac:91:b4:e7:20:
                    44:f6:27:41:61:35:6a:30:ff:cf:40:7d:48:29:88:31:
                    87:e7:08:f4:26:60:c1:bc:1e:9f:39:2e:a2:9b:b0:f7:
                    19:de:78:38:cb:97:f9:fb:cd:d9:c8:7e:59:65:0a:78:
                    3d:2d:49:ee:94:a2:a1:59:d3:37:c3:97:45:c0:58:e1:
                    de:f9:91:8e:7f:e0:f3:46:bc:f2:b9:aa:3f:18:5e:1d:
                    85:8d:25:76:6a:d1:8c:ed:c1:0b:ea:6a:8c:da:3a:83:
                    23:4c:6e:1d:6f:f4:f2:93:30:41:4f:88:08:b4:31:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6e:9f:98:e0:9e:ea:aa:e3:83:ee:d1:b2:46:2a:08:
        99:fc:2c:a4:be:24:05:22:6c:d5:68:2b:8b:74:88:df:
        9e:7b:72:d4:24:dc:e2:59:3b:65:1c:08:d1:b1:98:f4:
        81:ab:fb:15:6b:48:ad:6e:58:5e:23:9b:f4:ab:a6:16:
        09:d4:55:91:f8:14:12:c8:b9:91:ad:e5:f8:95:ad:02:
        07:d5:a2:ce:f6:98:1e:cc:d7:5f:a3:a3:63:d6:5c:22:
        f6:f2:fc:a3:4e:2a:6b:4d:84:ce:eb:b2:b3:4b:5b:51:
        5a:a2:3b:f4:72:2d:75:aa:13:9b:de:89:4b:44:0b:29
    Fingerprint (MD5):
        2D:2F:B3:49:E7:19:30:93:E8:E4:E2:3A:5D:62:29:D6
    Fingerprint (SHA1):
        AB:BC:C3:90:D6:F5:8E:1C:6A:44:25:6C:96:D6:47:E9:DF:5C:A2:FB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:11 2016
            Not After : Sun Jun 06 22:42:11 2021
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:99:3b:77:05:54:88:e8:b0:1c:44:d3:ab:90:59:dc:
                    7f:74:34:da:51:2c:d6:59:cb:ed:6a:a7:0e:cc:93:ef:
                    39:6c:dd:19:b6:39:d6:b2:e9:69:14:26:45:2e:1e:71:
                    91:c1:cc:7a:d3:62:c7:00:78:ac:74:09:26:3f:5c:6d:
                    f6:e9:62:0c:2c:18:28:f2:81:ca:bf:ce:b9:60:af:33:
                    c8:9f:f8:dd:25:73:8b:0f:b7:74:eb:ce:e4:22:f5:71:
                    59:be:67:1a:b6:c4:71:dd:67:ab:dc:f8:4f:7f:1d:bd:
                    09:15:a5:60:ae:2d:2b:fa:af:4e:ae:da:76:97:a9:7f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:f3:dd:3b:47:01:45:ed:b6:b3:ef:4f:bd:5d:b2:26:
        90:e5:b1:4d:31:af:7b:7e:3e:66:96:cd:fb:49:95:6a:
        b8:b2:49:f1:b2:2b:1c:4f:5f:54:22:18:65:36:18:12:
        4b:73:e9:7d:08:13:ed:c3:c4:80:9a:97:92:98:66:1a:
        df:d6:c2:fa:32:bc:b7:11:26:8b:ce:6b:fb:d3:e7:ef:
        3f:55:83:0d:db:bf:86:62:d1:a2:f2:89:cd:75:12:9c:
        60:a4:87:82:b1:91:09:d3:06:5f:12:6e:c2:51:2c:9d:
        3a:4a:0f:c9:1c:d9:b8:a1:c4:88:27:72:c4:84:81:67
    Fingerprint (MD5):
        5D:2B:CB:DD:6D:EC:07:1C:78:76:A9:06:AB:66:E7:D4
    Fingerprint (SHA1):
        F1:C7:DA:1B:7B:1B:20:DD:7E:15:51:82:0B:C2:B0:99:51:DE:20:7D

    Friendly Name: Alice

tools.sh: #412: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #413: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c null
pk12util: Algorithm: "null": security library: invalid algorithm.
tools.sh: #414: Exporting with [null:default] (pk12util -o)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #415: Exporting with [default:null] (pk12util -o)  - PASSED
tools.sh: Create objsign cert -------------------------------
signtool -G "objectsigner" -d ../tools/signdir -p "nss"

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit the browser before continuing this operation. Enter 
"y" to continue, or anything else to abort: 

Enter certificate information.  All fields are optional. Acceptable
characters are numbers, letters, spaces, and apostrophes.
certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair
certificate request generated
certificate has been signed
certificate "objsigner" added to database
Exported certificate to x509.raw and x509.cacert.
tools.sh: #416: Create objsign cert (signtool -G)  - PASSED
tools.sh: Signing a jar of files ----------------------------
signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \
         ../tools/html
Generating ../tools/html/META-INF/manifest.mf file..
--> sign.html
adding ../tools/html/sign.html to nojs.jar...(deflated 26%)
--> signjs.html
adding ../tools/html/signjs.html to nojs.jar...(deflated 28%)
Generating zigbert.sf file..
adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 29%)
adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%)
adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 33%)
tree "../tools/html" signed successfully
tools.sh: #417: Signing a jar of files (signtool -Z)  - PASSED
tools.sh: Listing signed files in jar ----------------------
signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner
archive "nojs.jar" has passed crypto verification.
found a MF master manifest file: META-INF/manifest.mf
found a SF signature manifest file: META-INF/zigbert.sf
  md5 digest on global metainfo: match
  sha digest on global metainfo: match
found a RSA signature file: META-INF/zigbert.rsa

          status   path
    ------------   -------------------
        verified   sign.html
        verified   signjs.html
tools.sh: #418: Listing signed files in jar (signtool -v)  - PASSED
tools.sh: Show who signed jar ------------------------------
signtool -w nojs.jar -d ../tools/signdir

Signer information:

nickname: objsigner
subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
tools.sh: #419: Show who signed jar (signtool -w)  - PASSED
tools.sh: Signing a xpi of files ----------------------------
signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \
         ../tools/html
Generating ../tools/html/META-INF/manifest.mf file..
--> sign.html
--> signjs.html
Generating zigbert.sf file..
Creating XPI Compatible Archive 
adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 33%)
--> sign.html
adding ../tools/html/sign.html to nojs.xpi...(deflated 26%)
--> signjs.html
adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%)
adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 29%)
adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%)
tree "../tools/html" signed successfully
tools.sh: #420: Signing a xpi of files (signtool -Z -X)  - PASSED
tools.sh: Listing signed files in xpi ----------------------
signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner
archive "nojs.xpi" has passed crypto verification.
found a RSA signature file: META-INF/zigbert.rsa
found a MF master manifest file: META-INF/manifest.mf
found a SF signature manifest file: META-INF/zigbert.sf
  md5 digest on global metainfo: match
  sha digest on global metainfo: match

          status   path
    ------------   -------------------
        verified   sign.html
        verified   signjs.html
tools.sh: #421: Listing signed files in xpi (signtool -v)  - PASSED
tools.sh: Show who signed xpi ------------------------------
signtool -w nojs.xpi -d ../tools/signdir

Signer information:

nickname: objsigner
subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
tools.sh: #422: Show who signed xpi (signtool -w)  - PASSED
TIMESTAMP tools END: Mon Jun  6 22:43:38 UTC 2016
Running tests for fips
TIMESTAMP fips BEGIN: Mon Jun  6 22:43:38 UTC 2016
fips.sh: FIPS 140 Compliance Tests ===============================
fips.sh: Verify this module is in FIPS mode  -----------------
modutil -dbdir ../fips -list

Listing of PKCS #11 Modules
-----------------------------------------------------------
  1. NSS Internal PKCS #11 Module
	 slots: 2 slots attached
	status: loaded

	 slot: NSS Internal Cryptographic Services
	token: NSS Generic Crypto Services

	 slot: NSS User Private Key and Certificate Services
	token: NSS Certificate DB

  2. RootCerts
	library name: /<<PKGBUILDDIR>>/mozilla/dist/lib/libnssckbi.so
	 slots: 1 slot attached
	status: loaded

	 slot: NSS Builtin Objects
	token: Builtin Object Token
-----------------------------------------------------------
FIPS mode disabled.
fips.sh: #423: Verify this module is in FIPS mode (modutil -chkfips true) . - FAILED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                Cu,Cu,Cu
fips.sh: #424: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys -------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services"
< 0> dsa      bb0a8bd6861f8baa0ca4fc9ac54c482d5c3cded8   NSS Certificate DB:FIPS_PUB_140_Test_Certificate
fips.sh: #425: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Attempt to list FIPS module keys with incorrect password
certutil -d ../fips -K -f /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests.fipsbadpw
certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services"
Incorrect password/PIN entered.
certutil: could not authenticate to token NSS Certificate DB.: The security password entered is incorrect.
fips.sh: #426: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED
certutil -K returned 255
fips.sh: Validate the certificate --------------------------
certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw
certutil: certificate is valid
fips.sh: #427: Validate the certificate (certutil -V -e) . - PASSED
fips.sh: Export the certificate and key as a PKCS#12 file --
pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 EXPORT SUCCESSFUL
fips.sh: #428: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED
fips.sh: Export the certificate as a DER-encoded file ------
certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt
fips.sh: #429: Export the certificate as a DER (certutil -L -r) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                Cu,Cu,Cu
fips.sh: #430: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: Delete the certificate and key from the FIPS module
certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw
fips.sh: #431: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI
fips.sh: #432: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys.
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services"
certutil: no keys found
fips.sh: #433: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Import the certificate and key from the PKCS#12 file
pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 IMPORT SUCCESSFUL
fips.sh: #434: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                u,u,u
fips.sh: #435: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys --------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services"
< 0> dsa      bb0a8bd6861f8baa0ca4fc9ac54c482d5c3cded8   FIPS_PUB_140_Test_Certificate
fips.sh: #436: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Delete the certificate from the FIPS module
certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate
fips.sh: #437: Delete the certificate from the FIPS module (certutil -D) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI
fips.sh: #438: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: Import the certificate and key from the PKCS#12 file
pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 IMPORT SUCCESSFUL
fips.sh: #439: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                u,u,u
fips.sh: #440: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys --------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services"
< 0> dsa      bb0a8bd6861f8baa0ca4fc9ac54c482d5c3cded8   FIPS_PUB_140_Test_Certificate
fips.sh: #441: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Run PK11MODE in FIPSMODE  -----------------
pk11mode -d ../fips -p fips- -f ../tests.fipspw
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 

FIPS MODE PKM_Error: C_Initialize failed with 0x00000005, CKR_GENERAL_ERROR         
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
**** Total number of TESTS ran in FIPS MODE is 2. ****
fips.sh: #442: Run PK11MODE in FIPS mode (pk11mode) . - FAILED
fips.sh: Run PK11MODE in Non FIPSMODE  -----------------
pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
Hybrid MODE PKM_Error: FC_Initialize failed with 0x00000005, CKR_GENERAL_ERROR         
Hybrid MODE PKM_Error: PKM_HybridMode failed with 0x00000005, CKR_GENERAL_ERROR         
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
**** Total number of TESTS ran in NON FIPS MODE is 99. ****
fips.sh: #443: Run PK11MODE in Non FIPS mode (pk11mode -n) . - FAILED
mkdir /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/mozilla/dist/lib/libcertdb.a /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/mozilla/dist/lib/libcerthi.a /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/mozilla/dist/lib/libcrmf.a /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/mozilla/dist/lib/libcryptohi.a /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/mozilla/dist/lib/libdbm.a /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/mozilla/dist/lib/libfreebl.a /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/mozilla/dist/lib/libfreebl3.so /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/mozilla/dist/lib/libjar.a /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/mozilla/dist/lib/libnss.a /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/mozilla/dist/lib/libnss3.so /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/mozilla/dist/lib/libnssb.a /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/mozilla/dist/lib/libnssckbi.so /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/mozilla/dist/lib/libnssckfw.a /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/mozilla/dist/lib/libnssdbm.a /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/mozilla/dist/lib/libnssdbm3.so /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/mozilla/dist/lib/libnssdev.a /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/mozilla/dist/lib/libnsspki.a /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/mozilla/dist/lib/libnssutil.a /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/mozilla/dist/lib/libnssutil3.so /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/mozilla/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkcs12.a /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkcs7.a /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixcertsel.a /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixchecker.a /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixcrlsel.a /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixmodule.a /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixparams.a /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixpki.a /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixresults.a /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixstore.a /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixsystem.a /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/mozilla/dist/lib/libpkixutil.a /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/mozilla/dist/lib/libsectool.a /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/mozilla/dist/lib/libsmime.a /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/mozilla/dist/lib/libsmime3.so /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/mozilla/dist/lib/libsoftokn.a /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/mozilla/dist/lib/libsoftokn3.so /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/mozilla/dist/lib/libssl.a /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/mozilla/dist/lib/libssl3.so /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips/mangle
fips.sh: Detect mangled softoken--------------------------
mangling /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips/mangle/libsoftokn3.so
mangle -i /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips/mangle/libsoftokn3.so -o -8 -b 5
Changing byte 0x000ccab3 (838323): from 5f (95) to 7f (127)
LD_LIBRARY_PATH=/<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/fips/mangle dbtest -r -d ../fips
fips.sh: #444: Init NSS with a corrupted library (dbtest -r) . - FAILED
fips.sh done
TIMESTAMP fips END: Mon Jun  6 22:44:07 UTC 2016
Running tests for sdr
TIMESTAMP sdr BEGIN: Mon Jun  6 22:44:07 UTC 2016
sdr.sh: SDR Tests ===============================
sdr.sh: Creating an SDR key/SDR Encrypt - Value 1
sdrtest -d . -o /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests.v1.1853 -t "Test1"
sdr.sh: #445: Creating SDR Key/Encrypt - Value 1  - PASSED
sdr.sh: SDR Encrypt - Value 2
sdrtest -d . -o /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests.v2.1853 -t "The quick brown fox jumped over the lazy dog"
sdr.sh: #446: Encrypt - Value 2  - PASSED
sdr.sh: SDR Encrypt - Value 3
sdrtest -d . -o /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests.v3.1853 -t "1234567"
sdr.sh: #447: Encrypt - Value 3  - PASSED
sdr.sh: SDR Decrypt - Value 1
sdrtest -d . -i /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests.v1.1853 -t "Test1"
sdr.sh: #448: Decrypt - Value 1  - PASSED
sdr.sh: SDR Decrypt - Value 2
sdrtest -d . -i /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests.v2.1853 -t "The quick brown fox jumped over the lazy dog"
sdr.sh: #449: Decrypt - Value 2  - PASSED
sdr.sh: SDR Decrypt - Value 3
sdrtest -d . -i /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests.v3.1853 -t "1234567"
sdr.sh: #450: Decrypt - Value 3  - PASSED
TIMESTAMP sdr END: Mon Jun  6 22:44:07 UTC 2016
Running tests for crmf
TIMESTAMP crmf BEGIN: Mon Jun  6 22:44:07 UTC 2016
crmf.sh: CRMF/CMMF Tests ===============================
crmf.sh: CRMF/CMMF Tests ------------------------------
crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss crmf decode

crmftest v1.0
Generating CRMF request
Decoding CRMF request
crmftest: Processing cert request 0
crmftest: Processing cert request 1
Exiting successfully!!!

crmf.sh: #451: CRMF test . - PASSED
crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss cmmf

crmftest v1.0
Doing CMMF Stuff
Exiting successfully!!!

crmf.sh: #452: CMMF test . - PASSED
TIMESTAMP crmf END: Mon Jun  6 22:44:08 UTC 2016
Running tests for smime
TIMESTAMP smime BEGIN: Mon Jun  6 22:44:08 UTC 2016
smime.sh: S/MIME Tests ===============================
smime.sh: Signing Detached Message {SHA1} ------------------
cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1
smime.sh: #453: Create Detached Signature Alice (SHA1) . - PASSED
cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #454: Verifying Alice's Detached Signature (SHA1) . - PASSED
smime.sh: Signing Attached Message (SHA1) ------------------
cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1
smime.sh: #455: Create Attached Signature Alice (SHA1) . - PASSED
cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.SHA1
smime.sh: #456: Decode Alice's Attached Signature (SHA1) . - PASSED
diff alice.txt alice.data.SHA1
smime.sh: #457: Compare Attached Signed Data and Original (SHA1) . - PASSED
smime.sh: Signing Detached Message {SHA256} ------------------
cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256
smime.sh: #458: Create Detached Signature Alice (SHA256) . - PASSED
cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #459: Verifying Alice's Detached Signature (SHA256) . - PASSED
smime.sh: Signing Attached Message (SHA256) ------------------
cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256
smime.sh: #460: Create Attached Signature Alice (SHA256) . - PASSED
cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.SHA256
smime.sh: #461: Decode Alice's Attached Signature (SHA256) . - PASSED
diff alice.txt alice.data.SHA256
smime.sh: #462: Compare Attached Signed Data and Original (SHA256) . - PASSED
smime.sh: Signing Detached Message {SHA384} ------------------
cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384
smime.sh: #463: Create Detached Signature Alice (SHA384) . - PASSED
cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #464: Verifying Alice's Detached Signature (SHA384) . - PASSED
smime.sh: Signing Attached Message (SHA384) ------------------
cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384
smime.sh: #465: Create Attached Signature Alice (SHA384) . - PASSED
cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.SHA384
smime.sh: #466: Decode Alice's Attached Signature (SHA384) . - PASSED
diff alice.txt alice.data.SHA384
smime.sh: #467: Compare Attached Signed Data and Original (SHA384) . - PASSED
smime.sh: Signing Detached Message {SHA512} ------------------
cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512
smime.sh: #468: Create Detached Signature Alice (SHA512) . - PASSED
cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #469: Verifying Alice's Detached Signature (SHA512) . - PASSED
smime.sh: Signing Attached Message (SHA512) ------------------
cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512
smime.sh: #470: Create Attached Signature Alice (SHA512) . - PASSED
cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.SHA512
smime.sh: #471: Decode Alice's Attached Signature (SHA512) . - PASSED
diff alice.txt alice.data.SHA512
smime.sh: #472: Compare Attached Signed Data and Original (SHA512) . - PASSED
smime.sh: Enveloped Data Tests ------------------------------
cmsutil -E -r bob@bogus.com -i alice.txt -d ../alicedir -p nss \
        -o alice.env
smime.sh: #473: Create Enveloped Data Alice . - PASSED
cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1
smime.sh: #474: Decode Enveloped Data Alice . - PASSED
diff alice.txt alice.data1
smime.sh: #475: Compare Decoded Enveloped Data and Original . - PASSED
smime.sh: Testing multiple recipients ------------------------------
cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \
        -r bob@bogus.com,dave@bogus.com
smime.sh: #476: Create Multiple Recipients Enveloped Data Alice . - PASSED
smime.sh: Testing multiple email addrs ------------------------------
cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \
        -r eve@bogus.net
smime.sh: #477: Encrypt to a Multiple Email cert . - PASSED
cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2
smime.sh: #478: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED
cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3
smime.sh: #479: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED
cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4
smime.sh: #480: Decrypt with a Multiple Email cert . - PASSED
smime.sh: #481: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED
smime.sh: #482: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED
smime.sh: #483: Compare Decoded with Multiple Email cert . - PASSED
smime.sh: Sending CERTS-ONLY Message ------------------------------
cmsutil -O -r "Alice,bob@bogus.com,dave@bogus.com" \
        -d ../alicedir > co.der
smime.sh: #484: Create Certs-Only Alice . - PASSED
cmsutil -D -i co.der -d ../bobdir
smime.sh: #485: Verify Certs-Only by CA . - PASSED
smime.sh: Encrypted-Data Message ---------------------------------
cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \
        -r "bob@bogus.com" > alice.enc
smime.sh: #486: Create Encrypted-Data . - PASSED
cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \
        -o alice.data2
smime.sh: #487: Decode Encrypted-Data . - PASSED
smime.sh: #488: Compare Decoded and Original Data . - PASSED
smime.sh: p7 util Data Tests ------------------------------
p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env
smime.sh: #489: Creating envelope for user Alice . - PASSED
p7content -d ../alicedir -i alice.env -o alice_p7.data
smime.sh: #490: Verifying file delivered to user Alice . - PASSED
diff alice.txt alice_p7.data.sed
smime.sh: #491: Compare Decoded Enveloped Data and Original . - PASSED
p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e
smime.sh: #492: Signing file for user Alice . - PASSED
p7verify -d ../alicedir -c alice.txt -s alice.sig
Signature is valid.
smime.sh: #493: Verifying file delivered to user Alice . - PASSED
TIMESTAMP smime END: Mon Jun  6 22:44:12 UTC 2016
Running tests for ssl
TIMESTAMP ssl BEGIN: Mon Jun  6 22:44:12 UTC 2016
ssl.sh: SSL tests ===============================
ssl.sh: CRL SSL Client Tests   ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:44:13 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:13 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 16317 >/dev/null 2>/dev/null
selfserv with PID 16317 found at Mon Jun  6 22:44:13 UTC 2016
selfserv with PID 16317 started at Mon Jun  6 22:44:13 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #494: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16317 at Mon Jun  6 22:44:13 UTC 2016
kill -USR1 16317
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16317 killed at Mon Jun  6 22:44:13 UTC 2016
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:44:13 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:13 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 16373 >/dev/null 2>/dev/null
selfserv with PID 16373 found at Mon Jun  6 22:44:13 UTC 2016
selfserv with PID 16373 started at Mon Jun  6 22:44:14 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #495: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16373 at Mon Jun  6 22:44:14 UTC 2016
kill -USR1 16373
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16373 killed at Mon Jun  6 22:44:14 UTC 2016
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:44:14 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:14 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 16429 >/dev/null 2>/dev/null
selfserv with PID 16429 found at Mon Jun  6 22:44:14 UTC 2016
selfserv with PID 16429 started at Mon Jun  6 22:44:14 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #496: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16429 at Mon Jun  6 22:44:15 UTC 2016
kill -USR1 16429
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16429 killed at Mon Jun  6 22:44:15 UTC 2016
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Mon Jun  6 22:44:15 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:15 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 16497 >/dev/null 2>/dev/null
selfserv with PID 16497 found at Mon Jun  6 22:44:15 UTC 2016
selfserv with PID 16497 started at Mon Jun  6 22:44:15 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w bogus -n TestUser40  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #497: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16497 at Mon Jun  6 22:44:16 UTC 2016
kill -USR1 16497
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16497 killed at Mon Jun  6 22:44:16 UTC 2016
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Mon Jun  6 22:44:16 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:16 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 16553 >/dev/null 2>/dev/null
selfserv with PID 16553 found at Mon Jun  6 22:44:16 UTC 2016
selfserv with PID 16553 started at Mon Jun  6 22:44:16 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w bogus -n TestUser41  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #498: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16553 at Mon Jun  6 22:44:16 UTC 2016
kill -USR1 16553
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16553 killed at Mon Jun  6 22:44:16 UTC 2016
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Mon Jun  6 22:44:17 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:17 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 16609 >/dev/null 2>/dev/null
selfserv with PID 16609 found at Mon Jun  6 22:44:17 UTC 2016
selfserv with PID 16609 started at Mon Jun  6 22:44:17 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w bogus -n TestUser42  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #499: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16609 at Mon Jun  6 22:44:17 UTC 2016
kill -USR1 16609
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16609 killed at Mon Jun  6 22:44:17 UTC 2016
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Mon Jun  6 22:44:17 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:18 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 16677 >/dev/null 2>/dev/null
selfserv with PID 16677 found at Mon Jun  6 22:44:18 UTC 2016
selfserv with PID 16677 started at Mon Jun  6 22:44:18 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n TestUser40  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #500: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 16677 at Mon Jun  6 22:44:18 UTC 2016
kill -USR1 16677
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16677 killed at Mon Jun  6 22:44:18 UTC 2016
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Mon Jun  6 22:44:18 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:18 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 16733 >/dev/null 2>/dev/null
selfserv with PID 16733 found at Mon Jun  6 22:44:18 UTC 2016
selfserv with PID 16733 started at Mon Jun  6 22:44:18 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n TestUser41  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #501: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16733 at Mon Jun  6 22:44:19 UTC 2016
kill -USR1 16733
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16733 killed at Mon Jun  6 22:44:19 UTC 2016
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Mon Jun  6 22:44:19 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:19 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 16789 >/dev/null 2>/dev/null
selfserv with PID 16789 found at Mon Jun  6 22:44:19 UTC 2016
selfserv with PID 16789 started at Mon Jun  6 22:44:19 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n TestUser42  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #502: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 16789 at Mon Jun  6 22:44:20 UTC 2016
kill -USR1 16789
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16789 killed at Mon Jun  6 22:44:20 UTC 2016
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:44:20 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:20 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 16859 >/dev/null 2>/dev/null
selfserv with PID 16859 found at Mon Jun  6 22:44:20 UTC 2016
selfserv with PID 16859 started at Mon Jun  6 22:44:20 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #503: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 16859 at Mon Jun  6 22:44:21 UTC 2016
kill -USR1 16859
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16859 killed at Mon Jun  6 22:44:21 UTC 2016
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:44:21 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:21 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 16918 >/dev/null 2>/dev/null
selfserv with PID 16918 found at Mon Jun  6 22:44:21 UTC 2016
selfserv with PID 16918 started at Mon Jun  6 22:44:21 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #504: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 16918 at Mon Jun  6 22:44:22 UTC 2016
kill -USR1 16918
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16918 killed at Mon Jun  6 22:44:22 UTC 2016
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:44:22 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:22 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 17043 >/dev/null 2>/dev/null
selfserv with PID 17043 found at Mon Jun  6 22:44:22 UTC 2016
selfserv with PID 17043 started at Mon Jun  6 22:44:22 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #505: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 17043 at Mon Jun  6 22:44:22 UTC 2016
kill -USR1 17043
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17043 killed at Mon Jun  6 22:44:22 UTC 2016
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Mon Jun  6 22:44:23 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:23 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 17138 >/dev/null 2>/dev/null
selfserv with PID 17138 found at Mon Jun  6 22:44:23 UTC 2016
selfserv with PID 17138 started at Mon Jun  6 22:44:23 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w bogus -n TestUser40  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #506: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 17138 at Mon Jun  6 22:44:23 UTC 2016
kill -USR1 17138
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17138 killed at Mon Jun  6 22:44:23 UTC 2016
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Mon Jun  6 22:44:23 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:23 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 17196 >/dev/null 2>/dev/null
selfserv with PID 17196 found at Mon Jun  6 22:44:23 UTC 2016
selfserv with PID 17196 started at Mon Jun  6 22:44:24 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w bogus -n TestUser41  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #507: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 17196 at Mon Jun  6 22:44:24 UTC 2016
kill -USR1 17196
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17196 killed at Mon Jun  6 22:44:24 UTC 2016
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Mon Jun  6 22:44:24 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:24 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 17297 >/dev/null 2>/dev/null
selfserv with PID 17297 found at Mon Jun  6 22:44:24 UTC 2016
selfserv with PID 17297 started at Mon Jun  6 22:44:24 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w bogus -n TestUser42  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #508: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 17297 at Mon Jun  6 22:44:25 UTC 2016
kill -USR1 17297
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17297 killed at Mon Jun  6 22:44:25 UTC 2016
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Mon Jun  6 22:44:25 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:25 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 17424 >/dev/null 2>/dev/null
selfserv with PID 17424 found at Mon Jun  6 22:44:25 UTC 2016
selfserv with PID 17424 started at Mon Jun  6 22:44:25 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n TestUser40   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #509: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 17424 at Mon Jun  6 22:44:26 UTC 2016
kill -USR1 17424
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17424 killed at Mon Jun  6 22:44:26 UTC 2016
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Mon Jun  6 22:44:26 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:26 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 17502 >/dev/null 2>/dev/null
selfserv with PID 17502 found at Mon Jun  6 22:44:26 UTC 2016
selfserv with PID 17502 started at Mon Jun  6 22:44:26 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n TestUser41   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #510: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17502 at Mon Jun  6 22:44:27 UTC 2016
kill -USR1 17502
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17502 killed at Mon Jun  6 22:44:27 UTC 2016
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Mon Jun  6 22:44:27 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:27 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 17565 >/dev/null 2>/dev/null
selfserv with PID 17565 found at Mon Jun  6 22:44:27 UTC 2016
selfserv with PID 17565 started at Mon Jun  6 22:44:27 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n TestUser42   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #511: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 17565 at Mon Jun  6 22:44:28 UTC 2016
kill -USR1 17565
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17565 killed at Mon Jun  6 22:44:28 UTC 2016
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:44:28 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:28 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 17648 >/dev/null 2>/dev/null
selfserv with PID 17648 found at Mon Jun  6 22:44:28 UTC 2016
selfserv with PID 17648 started at Mon Jun  6 22:44:28 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #512: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17648 at Mon Jun  6 22:44:29 UTC 2016
kill -USR1 17648
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17648 killed at Mon Jun  6 22:44:29 UTC 2016
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:44:29 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:29 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 17719 >/dev/null 2>/dev/null
selfserv with PID 17719 found at Mon Jun  6 22:44:29 UTC 2016
selfserv with PID 17719 started at Mon Jun  6 22:44:29 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #513: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17719 at Mon Jun  6 22:44:30 UTC 2016
kill -USR1 17719
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17719 killed at Mon Jun  6 22:44:30 UTC 2016
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:44:30 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:30 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 17788 >/dev/null 2>/dev/null
selfserv with PID 17788 found at Mon Jun  6 22:44:30 UTC 2016
selfserv with PID 17788 started at Mon Jun  6 22:44:30 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #514: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17788 at Mon Jun  6 22:44:31 UTC 2016
kill -USR1 17788
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17788 killed at Mon Jun  6 22:44:31 UTC 2016
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Mon Jun  6 22:44:31 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:31 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 17867 >/dev/null 2>/dev/null
selfserv with PID 17867 found at Mon Jun  6 22:44:31 UTC 2016
selfserv with PID 17867 started at Mon Jun  6 22:44:31 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w bogus  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #515: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17867 at Mon Jun  6 22:44:32 UTC 2016
kill -USR1 17867
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17867 killed at Mon Jun  6 22:44:32 UTC 2016
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Mon Jun  6 22:44:32 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:32 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 17962 >/dev/null 2>/dev/null
selfserv with PID 17962 found at Mon Jun  6 22:44:32 UTC 2016
selfserv with PID 17962 started at Mon Jun  6 22:44:32 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w bogus  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #516: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17962 at Mon Jun  6 22:44:32 UTC 2016
kill -USR1 17962
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17962 killed at Mon Jun  6 22:44:33 UTC 2016
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Mon Jun  6 22:44:33 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:33 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 18018 >/dev/null 2>/dev/null
selfserv with PID 18018 found at Mon Jun  6 22:44:33 UTC 2016
selfserv with PID 18018 started at Mon Jun  6 22:44:33 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w bogus  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #517: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18018 at Mon Jun  6 22:44:33 UTC 2016
kill -USR1 18018
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18018 killed at Mon Jun  6 22:44:33 UTC 2016
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Mon Jun  6 22:44:33 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:34 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 18086 >/dev/null 2>/dev/null
selfserv with PID 18086 found at Mon Jun  6 22:44:34 UTC 2016
selfserv with PID 18086 started at Mon Jun  6 22:44:34 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #518: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 18086 at Mon Jun  6 22:44:34 UTC 2016
kill -USR1 18086
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18086 killed at Mon Jun  6 22:44:34 UTC 2016
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Mon Jun  6 22:44:34 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:34 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 18142 >/dev/null 2>/dev/null
selfserv with PID 18142 found at Mon Jun  6 22:44:34 UTC 2016
selfserv with PID 18142 started at Mon Jun  6 22:44:34 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #519: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18142 at Mon Jun  6 22:44:35 UTC 2016
kill -USR1 18142
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18142 killed at Mon Jun  6 22:44:35 UTC 2016
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Mon Jun  6 22:44:35 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:35 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 18198 >/dev/null 2>/dev/null
selfserv with PID 18198 found at Mon Jun  6 22:44:35 UTC 2016
selfserv with PID 18198 started at Mon Jun  6 22:44:35 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #520: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 18198 at Mon Jun  6 22:44:36 UTC 2016
kill -USR1 18198
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18198 killed at Mon Jun  6 22:44:36 UTC 2016
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:44:36 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:36 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 18266 >/dev/null 2>/dev/null
selfserv with PID 18266 found at Mon Jun  6 22:44:36 UTC 2016
selfserv with PID 18266 started at Mon Jun  6 22:44:36 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #521: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 18266 at Mon Jun  6 22:44:37 UTC 2016
kill -USR1 18266
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18266 killed at Mon Jun  6 22:44:37 UTC 2016
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:44:37 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:37 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 18322 >/dev/null 2>/dev/null
selfserv with PID 18322 found at Mon Jun  6 22:44:37 UTC 2016
selfserv with PID 18322 started at Mon Jun  6 22:44:37 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #522: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 18322 at Mon Jun  6 22:44:38 UTC 2016
kill -USR1 18322
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18322 killed at Mon Jun  6 22:44:38 UTC 2016
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:44:38 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:38 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 18378 >/dev/null 2>/dev/null
selfserv with PID 18378 found at Mon Jun  6 22:44:38 UTC 2016
selfserv with PID 18378 started at Mon Jun  6 22:44:38 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #523: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 18378 at Mon Jun  6 22:44:38 UTC 2016
kill -USR1 18378
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18378 killed at Mon Jun  6 22:44:38 UTC 2016
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Mon Jun  6 22:44:38 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:39 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 18446 >/dev/null 2>/dev/null
selfserv with PID 18446 found at Mon Jun  6 22:44:39 UTC 2016
selfserv with PID 18446 started at Mon Jun  6 22:44:39 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w bogus  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #524: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 18446 at Mon Jun  6 22:44:39 UTC 2016
kill -USR1 18446
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18446 killed at Mon Jun  6 22:44:39 UTC 2016
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Mon Jun  6 22:44:39 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:39 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 18502 >/dev/null 2>/dev/null
selfserv with PID 18502 found at Mon Jun  6 22:44:39 UTC 2016
selfserv with PID 18502 started at Mon Jun  6 22:44:39 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w bogus  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #525: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 18502 at Mon Jun  6 22:44:40 UTC 2016
kill -USR1 18502
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18502 killed at Mon Jun  6 22:44:40 UTC 2016
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Mon Jun  6 22:44:40 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:40 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 18562 >/dev/null 2>/dev/null
selfserv with PID 18562 found at Mon Jun  6 22:44:40 UTC 2016
selfserv with PID 18562 started at Mon Jun  6 22:44:40 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w bogus  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #526: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 18562 at Mon Jun  6 22:44:41 UTC 2016
kill -USR1 18562
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18562 killed at Mon Jun  6 22:44:41 UTC 2016
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Mon Jun  6 22:44:41 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:41 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 18630 >/dev/null 2>/dev/null
selfserv with PID 18630 found at Mon Jun  6 22:44:41 UTC 2016
selfserv with PID 18630 started at Mon Jun  6 22:44:41 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #527: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 18630 at Mon Jun  6 22:44:42 UTC 2016
kill -USR1 18630
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18630 killed at Mon Jun  6 22:44:42 UTC 2016
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Mon Jun  6 22:44:42 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:42 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 18686 >/dev/null 2>/dev/null
selfserv with PID 18686 found at Mon Jun  6 22:44:42 UTC 2016
selfserv with PID 18686 started at Mon Jun  6 22:44:42 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #528: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18686 at Mon Jun  6 22:44:43 UTC 2016
kill -USR1 18686
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18686 killed at Mon Jun  6 22:44:43 UTC 2016
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Mon Jun  6 22:44:43 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:43 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 18742 >/dev/null 2>/dev/null
selfserv with PID 18742 found at Mon Jun  6 22:44:43 UTC 2016
selfserv with PID 18742 started at Mon Jun  6 22:44:43 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #529: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 18742 at Mon Jun  6 22:44:43 UTC 2016
kill -USR1 18742
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18742 killed at Mon Jun  6 22:44:43 UTC 2016
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:44:44 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:44 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 18810 >/dev/null 2>/dev/null
selfserv with PID 18810 found at Mon Jun  6 22:44:44 UTC 2016
selfserv with PID 18810 started at Mon Jun  6 22:44:44 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #530: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18810 at Mon Jun  6 22:44:44 UTC 2016
kill -USR1 18810
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18810 killed at Mon Jun  6 22:44:44 UTC 2016
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:44:44 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:44 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 18866 >/dev/null 2>/dev/null
selfserv with PID 18866 found at Mon Jun  6 22:44:45 UTC 2016
selfserv with PID 18866 started at Mon Jun  6 22:44:45 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #531: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18866 at Mon Jun  6 22:44:45 UTC 2016
kill -USR1 18866
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18866 killed at Mon Jun  6 22:44:45 UTC 2016
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:44:45 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:45 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 18922 >/dev/null 2>/dev/null
selfserv with PID 18922 found at Mon Jun  6 22:44:45 UTC 2016
selfserv with PID 18922 started at Mon Jun  6 22:44:45 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #532: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18922 at Mon Jun  6 22:44:46 UTC 2016
kill -USR1 18922
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18922 killed at Mon Jun  6 22:44:46 UTC 2016
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:44:46 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:46 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 18990 >/dev/null 2>/dev/null
selfserv with PID 18990 found at Mon Jun  6 22:44:46 UTC 2016
selfserv with PID 18990 started at Mon Jun  6 22:44:46 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #533: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18990 at Mon Jun  6 22:44:47 UTC 2016
kill -USR1 18990
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18990 killed at Mon Jun  6 22:44:47 UTC 2016
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:44:47 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:47 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 19046 >/dev/null 2>/dev/null
selfserv with PID 19046 found at Mon Jun  6 22:44:47 UTC 2016
selfserv with PID 19046 started at Mon Jun  6 22:44:47 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #534: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19046 at Mon Jun  6 22:44:48 UTC 2016
kill -USR1 19046
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19046 killed at Mon Jun  6 22:44:48 UTC 2016
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:44:48 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:48 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 19102 >/dev/null 2>/dev/null
selfserv with PID 19102 found at Mon Jun  6 22:44:48 UTC 2016
selfserv with PID 19102 started at Mon Jun  6 22:44:48 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #535: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19102 at Mon Jun  6 22:44:48 UTC 2016
kill -USR1 19102
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19102 killed at Mon Jun  6 22:44:48 UTC 2016
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:44:49 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:49 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 19170 >/dev/null 2>/dev/null
selfserv with PID 19170 found at Mon Jun  6 22:44:49 UTC 2016
selfserv with PID 19170 started at Mon Jun  6 22:44:49 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #536: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19170 at Mon Jun  6 22:44:49 UTC 2016
kill -USR1 19170
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19170 killed at Mon Jun  6 22:44:49 UTC 2016
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:44:49 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:49 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 19226 >/dev/null 2>/dev/null
selfserv with PID 19226 found at Mon Jun  6 22:44:49 UTC 2016
selfserv with PID 19226 started at Mon Jun  6 22:44:49 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #537: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19226 at Mon Jun  6 22:44:50 UTC 2016
kill -USR1 19226
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19226 killed at Mon Jun  6 22:44:50 UTC 2016
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:44:50 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:50 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 19282 >/dev/null 2>/dev/null
selfserv with PID 19282 found at Mon Jun  6 22:44:50 UTC 2016
selfserv with PID 19282 started at Mon Jun  6 22:44:50 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #538: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19282 at Mon Jun  6 22:44:51 UTC 2016
kill -USR1 19282
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19282 killed at Mon Jun  6 22:44:51 UTC 2016
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:44:51 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:51 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 19350 >/dev/null 2>/dev/null
selfserv with PID 19350 found at Mon Jun  6 22:44:51 UTC 2016
selfserv with PID 19350 started at Mon Jun  6 22:44:51 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #539: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19350 at Mon Jun  6 22:44:52 UTC 2016
kill -USR1 19350
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19350 killed at Mon Jun  6 22:44:52 UTC 2016
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:44:52 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:52 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 19406 >/dev/null 2>/dev/null
selfserv with PID 19406 found at Mon Jun  6 22:44:52 UTC 2016
selfserv with PID 19406 started at Mon Jun  6 22:44:52 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #540: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19406 at Mon Jun  6 22:44:53 UTC 2016
kill -USR1 19406
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19406 killed at Mon Jun  6 22:44:53 UTC 2016
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:44:53 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:53 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 19462 >/dev/null 2>/dev/null
selfserv with PID 19462 found at Mon Jun  6 22:44:53 UTC 2016
selfserv with PID 19462 started at Mon Jun  6 22:44:53 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #541: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19462 at Mon Jun  6 22:44:54 UTC 2016
kill -USR1 19462
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19462 killed at Mon Jun  6 22:44:54 UTC 2016
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:44:54 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:54 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 19530 >/dev/null 2>/dev/null
selfserv with PID 19530 found at Mon Jun  6 22:44:54 UTC 2016
selfserv with PID 19530 started at Mon Jun  6 22:44:54 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #542: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19530 at Mon Jun  6 22:44:54 UTC 2016
kill -USR1 19530
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19530 killed at Mon Jun  6 22:44:54 UTC 2016
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:44:55 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:55 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 19586 >/dev/null 2>/dev/null
selfserv with PID 19586 found at Mon Jun  6 22:44:55 UTC 2016
selfserv with PID 19586 started at Mon Jun  6 22:44:55 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #543: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19586 at Mon Jun  6 22:44:55 UTC 2016
kill -USR1 19586
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19586 killed at Mon Jun  6 22:44:55 UTC 2016
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:44:55 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:55 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 19642 >/dev/null 2>/dev/null
selfserv with PID 19642 found at Mon Jun  6 22:44:56 UTC 2016
selfserv with PID 19642 started at Mon Jun  6 22:44:56 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #544: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19642 at Mon Jun  6 22:44:56 UTC 2016
kill -USR1 19642
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19642 killed at Mon Jun  6 22:44:56 UTC 2016
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:44:56 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:56 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 19710 >/dev/null 2>/dev/null
selfserv with PID 19710 found at Mon Jun  6 22:44:56 UTC 2016
selfserv with PID 19710 started at Mon Jun  6 22:44:56 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #545: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19710 at Mon Jun  6 22:44:57 UTC 2016
kill -USR1 19710
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19710 killed at Mon Jun  6 22:44:57 UTC 2016
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:44:57 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:57 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 19766 >/dev/null 2>/dev/null
selfserv with PID 19766 found at Mon Jun  6 22:44:57 UTC 2016
selfserv with PID 19766 started at Mon Jun  6 22:44:57 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #546: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19766 at Mon Jun  6 22:44:58 UTC 2016
kill -USR1 19766
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19766 killed at Mon Jun  6 22:44:58 UTC 2016
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:44:58 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:58 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 19822 >/dev/null 2>/dev/null
selfserv with PID 19822 found at Mon Jun  6 22:44:58 UTC 2016
selfserv with PID 19822 started at Mon Jun  6 22:44:58 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #547: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19822 at Mon Jun  6 22:44:59 UTC 2016
kill -USR1 19822
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19822 killed at Mon Jun  6 22:44:59 UTC 2016
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:44:59 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:44:59 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 19890 >/dev/null 2>/dev/null
selfserv with PID 19890 found at Mon Jun  6 22:44:59 UTC 2016
selfserv with PID 19890 started at Mon Jun  6 22:44:59 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #548: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19890 at Mon Jun  6 22:45:00 UTC 2016
kill -USR1 19890
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19890 killed at Mon Jun  6 22:45:00 UTC 2016
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:45:00 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:45:00 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 19946 >/dev/null 2>/dev/null
selfserv with PID 19946 found at Mon Jun  6 22:45:00 UTC 2016
selfserv with PID 19946 started at Mon Jun  6 22:45:00 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #549: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19946 at Mon Jun  6 22:45:01 UTC 2016
kill -USR1 19946
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19946 killed at Mon Jun  6 22:45:01 UTC 2016
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:45:01 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:45:01 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 20004 >/dev/null 2>/dev/null
selfserv with PID 20004 found at Mon Jun  6 22:45:01 UTC 2016
selfserv with PID 20004 started at Mon Jun  6 22:45:01 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #550: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20004 at Mon Jun  6 22:45:02 UTC 2016
kill -USR1 20004
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20004 killed at Mon Jun  6 22:45:02 UTC 2016
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:45:02 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:45:02 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 20072 >/dev/null 2>/dev/null
selfserv with PID 20072 found at Mon Jun  6 22:45:02 UTC 2016
selfserv with PID 20072 started at Mon Jun  6 22:45:02 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #551: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20072 at Mon Jun  6 22:45:03 UTC 2016
kill -USR1 20072
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20072 killed at Mon Jun  6 22:45:03 UTC 2016
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:45:03 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:45:03 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 20132 >/dev/null 2>/dev/null
selfserv with PID 20132 found at Mon Jun  6 22:45:03 UTC 2016
selfserv with PID 20132 started at Mon Jun  6 22:45:03 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #552: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20132 at Mon Jun  6 22:45:03 UTC 2016
kill -USR1 20132
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20132 killed at Mon Jun  6 22:45:04 UTC 2016
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:45:04 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:45:04 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 20200 >/dev/null 2>/dev/null
selfserv with PID 20200 found at Mon Jun  6 22:45:04 UTC 2016
selfserv with PID 20200 started at Mon Jun  6 22:45:04 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #553: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20200 at Mon Jun  6 22:45:04 UTC 2016
kill -USR1 20200
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20200 killed at Mon Jun  6 22:45:04 UTC 2016
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:45:04 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:45:04 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 20268 >/dev/null 2>/dev/null
selfserv with PID 20268 found at Mon Jun  6 22:45:05 UTC 2016
selfserv with PID 20268 started at Mon Jun  6 22:45:05 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #554: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 20268 at Mon Jun  6 22:45:05 UTC 2016
kill -USR1 20268
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20268 killed at Mon Jun  6 22:45:05 UTC 2016
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:45:05 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:45:05 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 20324 >/dev/null 2>/dev/null
selfserv with PID 20324 found at Mon Jun  6 22:45:05 UTC 2016
selfserv with PID 20324 started at Mon Jun  6 22:45:05 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #555: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20324 at Mon Jun  6 22:45:06 UTC 2016
kill -USR1 20324
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20324 killed at Mon Jun  6 22:45:06 UTC 2016
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:45:06 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:45:06 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 20380 >/dev/null 2>/dev/null
selfserv with PID 20380 found at Mon Jun  6 22:45:06 UTC 2016
selfserv with PID 20380 started at Mon Jun  6 22:45:06 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #556: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 20380 at Mon Jun  6 22:45:07 UTC 2016
kill -USR1 20380
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20380 killed at Mon Jun  6 22:45:07 UTC 2016
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:45:07 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:45:07 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 20448 >/dev/null 2>/dev/null
selfserv with PID 20448 found at Mon Jun  6 22:45:07 UTC 2016
selfserv with PID 20448 started at Mon Jun  6 22:45:07 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #557: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 20448 at Mon Jun  6 22:45:08 UTC 2016
kill -USR1 20448
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20448 killed at Mon Jun  6 22:45:08 UTC 2016
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:45:08 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:45:08 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 20504 >/dev/null 2>/dev/null
selfserv with PID 20504 found at Mon Jun  6 22:45:08 UTC 2016
selfserv with PID 20504 started at Mon Jun  6 22:45:08 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #558: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 20504 at Mon Jun  6 22:45:09 UTC 2016
kill -USR1 20504
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20504 killed at Mon Jun  6 22:45:09 UTC 2016
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:45:09 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:45:09 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 20560 >/dev/null 2>/dev/null
selfserv with PID 20560 found at Mon Jun  6 22:45:09 UTC 2016
selfserv with PID 20560 started at Mon Jun  6 22:45:09 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #559: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 20560 at Mon Jun  6 22:45:09 UTC 2016
kill -USR1 20560
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20560 killed at Mon Jun  6 22:45:09 UTC 2016
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:45:10 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:45:10 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 20628 >/dev/null 2>/dev/null
selfserv with PID 20628 found at Mon Jun  6 22:45:10 UTC 2016
selfserv with PID 20628 started at Mon Jun  6 22:45:10 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #560: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 20628 at Mon Jun  6 22:45:10 UTC 2016
kill -USR1 20628
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20628 killed at Mon Jun  6 22:45:10 UTC 2016
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:45:10 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:45:10 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 20684 >/dev/null 2>/dev/null
selfserv with PID 20684 found at Mon Jun  6 22:45:10 UTC 2016
selfserv with PID 20684 started at Mon Jun  6 22:45:10 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #561: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 20684 at Mon Jun  6 22:45:11 UTC 2016
kill -USR1 20684
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20684 killed at Mon Jun  6 22:45:11 UTC 2016
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:45:11 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:45:11 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 20740 >/dev/null 2>/dev/null
selfserv with PID 20740 found at Mon Jun  6 22:45:11 UTC 2016
selfserv with PID 20740 started at Mon Jun  6 22:45:11 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x09 for socket out_flags.
tstclnt: PR_Poll returned 0x09 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #562: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 20740 at Mon Jun  6 22:45:12 UTC 2016
kill -USR1 20740
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20740 killed at Mon Jun  6 22:45:12 UTC 2016
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:45:12 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:45:12 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 20808 >/dev/null 2>/dev/null
selfserv with PID 20808 found at Mon Jun  6 22:45:12 UTC 2016
selfserv with PID 20808 started at Mon Jun  6 22:45:12 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #563: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 20808 at Mon Jun  6 22:45:13 UTC 2016
kill -USR1 20808
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20808 killed at Mon Jun  6 22:45:13 UTC 2016
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:45:13 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:45:13 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 20864 >/dev/null 2>/dev/null
selfserv with PID 20864 found at Mon Jun  6 22:45:13 UTC 2016
selfserv with PID 20864 started at Mon Jun  6 22:45:13 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #564: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20864 at Mon Jun  6 22:45:14 UTC 2016
kill -USR1 20864
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20864 killed at Mon Jun  6 22:45:14 UTC 2016
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:45:14 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:45:14 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 20920 >/dev/null 2>/dev/null
selfserv with PID 20920 found at Mon Jun  6 22:45:14 UTC 2016
selfserv with PID 20920 started at Mon Jun  6 22:45:14 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #565: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 20920 at Mon Jun  6 22:45:14 UTC 2016
kill -USR1 20920
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20920 killed at Mon Jun  6 22:45:14 UTC 2016
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:45:15 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:45:15 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 20988 >/dev/null 2>/dev/null
selfserv with PID 20988 found at Mon Jun  6 22:45:15 UTC 2016
selfserv with PID 20988 started at Mon Jun  6 22:45:15 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #566: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20988 at Mon Jun  6 22:45:15 UTC 2016
kill -USR1 20988
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20988 killed at Mon Jun  6 22:45:15 UTC 2016
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:45:16 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:45:16 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 21044 >/dev/null 2>/dev/null
selfserv with PID 21044 found at Mon Jun  6 22:45:16 UTC 2016
selfserv with PID 21044 started at Mon Jun  6 22:45:16 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #567: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21044 at Mon Jun  6 22:45:16 UTC 2016
kill -USR1 21044
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21044 killed at Mon Jun  6 22:45:16 UTC 2016
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:45:16 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:45:16 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 21100 >/dev/null 2>/dev/null
selfserv with PID 21100 found at Mon Jun  6 22:45:16 UTC 2016
selfserv with PID 21100 started at Mon Jun  6 22:45:16 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #568: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21100 at Mon Jun  6 22:45:17 UTC 2016
kill -USR1 21100
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21100 killed at Mon Jun  6 22:45:17 UTC 2016
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:45:17 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:45:17 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 21168 >/dev/null 2>/dev/null
selfserv with PID 21168 found at Mon Jun  6 22:45:17 UTC 2016
selfserv with PID 21168 started at Mon Jun  6 22:45:17 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w bogus  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #569: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21168 at Mon Jun  6 22:45:18 UTC 2016
kill -USR1 21168
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21168 killed at Mon Jun  6 22:45:18 UTC 2016
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:45:18 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:45:18 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 21224 >/dev/null 2>/dev/null
selfserv with PID 21224 found at Mon Jun  6 22:45:18 UTC 2016
selfserv with PID 21224 started at Mon Jun  6 22:45:18 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w bogus  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #570: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21224 at Mon Jun  6 22:45:19 UTC 2016
kill -USR1 21224
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21224 killed at Mon Jun  6 22:45:19 UTC 2016
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:45:19 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:45:19 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 21280 >/dev/null 2>/dev/null
selfserv with PID 21280 found at Mon Jun  6 22:45:19 UTC 2016
selfserv with PID 21280 started at Mon Jun  6 22:45:19 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w bogus  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #571: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21280 at Mon Jun  6 22:45:20 UTC 2016
kill -USR1 21280
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21280 killed at Mon Jun  6 22:45:20 UTC 2016
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:45:20 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:45:20 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 21348 >/dev/null 2>/dev/null
selfserv with PID 21348 found at Mon Jun  6 22:45:20 UTC 2016
selfserv with PID 21348 started at Mon Jun  6 22:45:20 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #572: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21348 at Mon Jun  6 22:45:20 UTC 2016
kill -USR1 21348
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21348 killed at Mon Jun  6 22:45:21 UTC 2016
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:45:21 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:45:21 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 21404 >/dev/null 2>/dev/null
selfserv with PID 21404 found at Mon Jun  6 22:45:21 UTC 2016
selfserv with PID 21404 started at Mon Jun  6 22:45:21 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #573: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21404 at Mon Jun  6 22:45:21 UTC 2016
kill -USR1 21404
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21404 killed at Mon Jun  6 22:45:21 UTC 2016
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:45:21 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:45:21 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 21460 >/dev/null 2>/dev/null
selfserv with PID 21460 found at Mon Jun  6 22:45:21 UTC 2016
selfserv with PID 21460 started at Mon Jun  6 22:45:22 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #574: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21460 at Mon Jun  6 22:45:22 UTC 2016
kill -USR1 21460
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21460 killed at Mon Jun  6 22:45:22 UTC 2016
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:45:22 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:45:22 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 21528 >/dev/null 2>/dev/null
selfserv with PID 21528 found at Mon Jun  6 22:45:22 UTC 2016
selfserv with PID 21528 started at Mon Jun  6 22:45:22 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #575: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21528 at Mon Jun  6 22:45:23 UTC 2016
kill -USR1 21528
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21528 killed at Mon Jun  6 22:45:23 UTC 2016
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:45:23 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:45:23 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 21584 >/dev/null 2>/dev/null
selfserv with PID 21584 found at Mon Jun  6 22:45:23 UTC 2016
selfserv with PID 21584 started at Mon Jun  6 22:45:23 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #576: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21584 at Mon Jun  6 22:45:24 UTC 2016
kill -USR1 21584
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21584 killed at Mon Jun  6 22:45:24 UTC 2016
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:45:24 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:45:24 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 21640 >/dev/null 2>/dev/null
selfserv with PID 21640 found at Mon Jun  6 22:45:24 UTC 2016
selfserv with PID 21640 started at Mon Jun  6 22:45:24 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #577: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21640 at Mon Jun  6 22:45:25 UTC 2016
kill -USR1 21640
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21640 killed at Mon Jun  6 22:45:25 UTC 2016
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:45:25 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:45:25 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 21708 >/dev/null 2>/dev/null
selfserv with PID 21708 found at Mon Jun  6 22:45:25 UTC 2016
selfserv with PID 21708 started at Mon Jun  6 22:45:25 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w bogus  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #578: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21708 at Mon Jun  6 22:45:25 UTC 2016
kill -USR1 21708
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21708 killed at Mon Jun  6 22:45:26 UTC 2016
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:45:26 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:45:26 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 21764 >/dev/null 2>/dev/null
selfserv with PID 21764 found at Mon Jun  6 22:45:26 UTC 2016
selfserv with PID 21764 started at Mon Jun  6 22:45:26 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w bogus  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #579: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21764 at Mon Jun  6 22:45:26 UTC 2016
kill -USR1 21764
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21764 killed at Mon Jun  6 22:45:26 UTC 2016
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:45:26 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:45:26 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 21820 >/dev/null 2>/dev/null
selfserv with PID 21820 found at Mon Jun  6 22:45:26 UTC 2016
selfserv with PID 21820 started at Mon Jun  6 22:45:27 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w bogus  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #580: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21820 at Mon Jun  6 22:45:27 UTC 2016
kill -USR1 21820
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21820 killed at Mon Jun  6 22:45:27 UTC 2016
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:45:27 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:45:27 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 21888 >/dev/null 2>/dev/null
selfserv with PID 21888 found at Mon Jun  6 22:45:27 UTC 2016
selfserv with PID 21888 started at Mon Jun  6 22:45:27 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #581: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21888 at Mon Jun  6 22:45:28 UTC 2016
kill -USR1 21888
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21888 killed at Mon Jun  6 22:45:28 UTC 2016
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:45:28 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:45:28 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 21944 >/dev/null 2>/dev/null
selfserv with PID 21944 found at Mon Jun  6 22:45:28 UTC 2016
selfserv with PID 21944 started at Mon Jun  6 22:45:28 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #582: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21944 at Mon Jun  6 22:45:29 UTC 2016
kill -USR1 21944
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21944 killed at Mon Jun  6 22:45:29 UTC 2016
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:45:29 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:45:29 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 22000 >/dev/null 2>/dev/null
selfserv with PID 22000 found at Mon Jun  6 22:45:29 UTC 2016
selfserv with PID 22000 started at Mon Jun  6 22:45:29 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #583: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 22000 at Mon Jun  6 22:45:30 UTC 2016
kill -USR1 22000
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22000 killed at Mon Jun  6 22:45:30 UTC 2016
ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only)
ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only)
ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only)
ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only)
ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only)
ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only)
ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only)
ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only)
ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: Cache CRL SSL Client Tests   ===============================
/<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/authin.tl.tmp
0
selfserv starting at Mon Jun  6 22:45:30 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:45:30 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 22072 >/dev/null 2>/dev/null
selfserv with PID 22072 found at Mon Jun  6 22:45:30 UTC 2016
selfserv with PID 22072 started at Mon Jun  6 22:45:30 UTC 2016
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n TestUser40   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 22072 >/dev/null 2>/dev/null
selfserv with PID 22072 found at Mon Jun  6 22:45:31 UTC 2016
ssl.sh: #584: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n TestUser41   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22072 >/dev/null 2>/dev/null
selfserv with PID 22072 found at Mon Jun  6 22:45:31 UTC 2016
ssl.sh: #585: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n TestUser42   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 22072 >/dev/null 2>/dev/null
selfserv with PID 22072 found at Mon Jun  6 22:45:31 UTC 2016
ssl.sh: #586: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n TestUser43   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22072 >/dev/null 2>/dev/null
selfserv with PID 22072 found at Mon Jun  6 22:45:31 UTC 2016
ssl.sh: #587: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n TestUser44   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22072 >/dev/null 2>/dev/null
selfserv with PID 22072 found at Mon Jun  6 22:45:32 UTC 2016
ssl.sh: #588: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n TestUser45   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22072 >/dev/null 2>/dev/null
selfserv with PID 22072 found at Mon Jun  6 22:45:32 UTC 2016
ssl.sh: #589: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n TestUser46   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22072 >/dev/null 2>/dev/null
selfserv with PID 22072 found at Mon Jun  6 22:45:32 UTC 2016
ssl.sh: #590: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n TestUser47   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22072 >/dev/null 2>/dev/null
selfserv with PID 22072 found at Mon Jun  6 22:45:32 UTC 2016
ssl.sh: #591: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n TestUser48   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22072 >/dev/null 2>/dev/null
selfserv with PID 22072 found at Mon Jun  6 22:45:33 UTC 2016
ssl.sh: #592: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n TestUser49   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22072 >/dev/null 2>/dev/null
selfserv with PID 22072 found at Mon Jun  6 22:45:33 UTC 2016
ssl.sh: #593: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n TestUser50   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22072 >/dev/null 2>/dev/null
selfserv with PID 22072 found at Mon Jun  6 22:45:33 UTC 2016
ssl.sh: #594: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n TestUser51   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22072 >/dev/null 2>/dev/null
selfserv with PID 22072 found at Mon Jun  6 22:45:34 UTC 2016
ssl.sh: #595: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n TestUser52   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22072 >/dev/null 2>/dev/null
selfserv with PID 22072 found at Mon Jun  6 22:45:34 UTC 2016
ssl.sh: #596: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 106 bytes
tstclnt: Writing 106 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22072 >/dev/null 2>/dev/null
selfserv with PID 22072 found at Mon Jun  6 22:45:34 UTC 2016
================= CRL Reloaded =============
ssl.sh: #597: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n TestUser40   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 22072 >/dev/null 2>/dev/null
selfserv with PID 22072 found at Mon Jun  6 22:45:34 UTC 2016
ssl.sh: #598: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n TestUser41   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22072 >/dev/null 2>/dev/null
selfserv with PID 22072 found at Mon Jun  6 22:45:35 UTC 2016
ssl.sh: #599: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n TestUser42   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 22072 >/dev/null 2>/dev/null
selfserv with PID 22072 found at Mon Jun  6 22:45:35 UTC 2016
ssl.sh: #600: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n TestUser43   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 22072 >/dev/null 2>/dev/null
selfserv with PID 22072 found at Mon Jun  6 22:45:35 UTC 2016
ssl.sh: #601: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n TestUser44   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 22072 >/dev/null 2>/dev/null
selfserv with PID 22072 found at Mon Jun  6 22:45:35 UTC 2016
ssl.sh: #602: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n TestUser45   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 22072 >/dev/null 2>/dev/null
selfserv with PID 22072 found at Mon Jun  6 22:45:36 UTC 2016
ssl.sh: #603: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n TestUser46   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22072 >/dev/null 2>/dev/null
selfserv with PID 22072 found at Mon Jun  6 22:45:36 UTC 2016
ssl.sh: #604: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n TestUser47   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 22072 >/dev/null 2>/dev/null
selfserv with PID 22072 found at Mon Jun  6 22:45:36 UTC 2016
ssl.sh: #605: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n TestUser48   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 22072 >/dev/null 2>/dev/null
selfserv with PID 22072 found at Mon Jun  6 22:45:36 UTC 2016
ssl.sh: #606: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n TestUser49   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22072 >/dev/null 2>/dev/null
selfserv with PID 22072 found at Mon Jun  6 22:45:37 UTC 2016
ssl.sh: #607: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n TestUser50   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22072 >/dev/null 2>/dev/null
selfserv with PID 22072 found at Mon Jun  6 22:45:37 UTC 2016
ssl.sh: #608: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n TestUser51   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22072 >/dev/null 2>/dev/null
selfserv with PID 22072 found at Mon Jun  6 22:45:37 UTC 2016
ssl.sh: #609: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n TestUser52   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22072 >/dev/null 2>/dev/null
selfserv with PID 22072 found at Mon Jun  6 22:45:38 UTC 2016
ssl.sh: #610: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 106 bytes
tstclnt: Writing 106 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22072 >/dev/null 2>/dev/null
selfserv with PID 22072 found at Mon Jun  6 22:45:38 UTC 2016
================= CRL Reloaded =============
ssl.sh: #611: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n TestUser40   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 22072 >/dev/null 2>/dev/null
selfserv with PID 22072 found at Mon Jun  6 22:45:38 UTC 2016
ssl.sh: #612: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n TestUser41   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22072 >/dev/null 2>/dev/null
selfserv with PID 22072 found at Mon Jun  6 22:45:38 UTC 2016
ssl.sh: #613: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n TestUser42   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 22072 >/dev/null 2>/dev/null
selfserv with PID 22072 found at Mon Jun  6 22:45:39 UTC 2016
ssl.sh: #614: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n TestUser43   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 22072 >/dev/null 2>/dev/null
selfserv with PID 22072 found at Mon Jun  6 22:45:39 UTC 2016
ssl.sh: #615: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n TestUser44   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 22072 >/dev/null 2>/dev/null
selfserv with PID 22072 found at Mon Jun  6 22:45:39 UTC 2016
ssl.sh: #616: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n TestUser45   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 22072 >/dev/null 2>/dev/null
selfserv with PID 22072 found at Mon Jun  6 22:45:39 UTC 2016
ssl.sh: #617: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n TestUser46   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22072 >/dev/null 2>/dev/null
selfserv with PID 22072 found at Mon Jun  6 22:45:40 UTC 2016
ssl.sh: #618: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n TestUser47   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 22072 >/dev/null 2>/dev/null
selfserv with PID 22072 found at Mon Jun  6 22:45:40 UTC 2016
ssl.sh: #619: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n TestUser48   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 22072 >/dev/null 2>/dev/null
selfserv with PID 22072 found at Mon Jun  6 22:45:40 UTC 2016
ssl.sh: #620: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n TestUser49   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 22072 >/dev/null 2>/dev/null
selfserv with PID 22072 found at Mon Jun  6 22:45:40 UTC 2016
ssl.sh: #621: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n TestUser50   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 22072 >/dev/null 2>/dev/null
selfserv with PID 22072 found at Mon Jun  6 22:45:41 UTC 2016
ssl.sh: #622: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n TestUser51   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22072 >/dev/null 2>/dev/null
selfserv with PID 22072 found at Mon Jun  6 22:45:41 UTC 2016
ssl.sh: #623: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -w nss -n TestUser52   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 22072 >/dev/null 2>/dev/null
selfserv with PID 22072 found at Mon Jun  6 22:45:41 UTC 2016
ssl.sh: #624: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 22072 at Mon Jun  6 22:45:41 UTC 2016
kill -USR1 22072
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22072 killed at Mon Jun  6 22:45:41 UTC 2016
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Mon Jun  6 22:45:41 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:45:42 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 23494 >/dev/null 2>/dev/null
selfserv with PID 23494 found at Mon Jun  6 22:45:42 UTC 2016
selfserv with PID 23494 started at Mon Jun  6 22:45:42 UTC 2016
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 23494 >/dev/null 2>/dev/null
selfserv with PID 23494 found at Mon Jun  6 22:45:42 UTC 2016
ssl.sh: #625: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23494 >/dev/null 2>/dev/null
selfserv with PID 23494 found at Mon Jun  6 22:45:42 UTC 2016
ssl.sh: #626: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 23494 >/dev/null 2>/dev/null
selfserv with PID 23494 found at Mon Jun  6 22:45:43 UTC 2016
ssl.sh: #627: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser43 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23494 >/dev/null 2>/dev/null
selfserv with PID 23494 found at Mon Jun  6 22:45:43 UTC 2016
ssl.sh: #628: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser44 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23494 >/dev/null 2>/dev/null
selfserv with PID 23494 found at Mon Jun  6 22:45:43 UTC 2016
ssl.sh: #629: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser45 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23494 >/dev/null 2>/dev/null
selfserv with PID 23494 found at Mon Jun  6 22:45:44 UTC 2016
ssl.sh: #630: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser46 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23494 >/dev/null 2>/dev/null
selfserv with PID 23494 found at Mon Jun  6 22:45:44 UTC 2016
ssl.sh: #631: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser47 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23494 >/dev/null 2>/dev/null
selfserv with PID 23494 found at Mon Jun  6 22:45:44 UTC 2016
ssl.sh: #632: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser48 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23494 >/dev/null 2>/dev/null
selfserv with PID 23494 found at Mon Jun  6 22:45:44 UTC 2016
ssl.sh: #633: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser49 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23494 >/dev/null 2>/dev/null
selfserv with PID 23494 found at Mon Jun  6 22:45:45 UTC 2016
ssl.sh: #634: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser50 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23494 >/dev/null 2>/dev/null
selfserv with PID 23494 found at Mon Jun  6 22:45:45 UTC 2016
ssl.sh: #635: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser51 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23494 >/dev/null 2>/dev/null
selfserv with PID 23494 found at Mon Jun  6 22:45:45 UTC 2016
ssl.sh: #636: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser52 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23494 >/dev/null 2>/dev/null
selfserv with PID 23494 found at Mon Jun  6 22:45:46 UTC 2016
ssl.sh: #637: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 106 bytes
tstclnt: Writing 106 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23494 >/dev/null 2>/dev/null
selfserv with PID 23494 found at Mon Jun  6 22:45:46 UTC 2016
================= CRL Reloaded =============
ssl.sh: #638: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 23494 >/dev/null 2>/dev/null
selfserv with PID 23494 found at Mon Jun  6 22:45:46 UTC 2016
ssl.sh: #639: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23494 >/dev/null 2>/dev/null
selfserv with PID 23494 found at Mon Jun  6 22:45:46 UTC 2016
ssl.sh: #640: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 23494 >/dev/null 2>/dev/null
selfserv with PID 23494 found at Mon Jun  6 22:45:46 UTC 2016
ssl.sh: #641: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser43 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 23494 >/dev/null 2>/dev/null
selfserv with PID 23494 found at Mon Jun  6 22:45:47 UTC 2016
ssl.sh: #642: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser44 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 23494 >/dev/null 2>/dev/null
selfserv with PID 23494 found at Mon Jun  6 22:45:47 UTC 2016
ssl.sh: #643: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser45 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 23494 >/dev/null 2>/dev/null
selfserv with PID 23494 found at Mon Jun  6 22:45:47 UTC 2016
ssl.sh: #644: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser46 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23494 >/dev/null 2>/dev/null
selfserv with PID 23494 found at Mon Jun  6 22:45:47 UTC 2016
ssl.sh: #645: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser47 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 23494 >/dev/null 2>/dev/null
selfserv with PID 23494 found at Mon Jun  6 22:45:48 UTC 2016
ssl.sh: #646: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser48 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 23494 >/dev/null 2>/dev/null
selfserv with PID 23494 found at Mon Jun  6 22:45:48 UTC 2016
ssl.sh: #647: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser49 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23494 >/dev/null 2>/dev/null
selfserv with PID 23494 found at Mon Jun  6 22:45:48 UTC 2016
ssl.sh: #648: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser50 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23494 >/dev/null 2>/dev/null
selfserv with PID 23494 found at Mon Jun  6 22:45:49 UTC 2016
ssl.sh: #649: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser51 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23494 >/dev/null 2>/dev/null
selfserv with PID 23494 found at Mon Jun  6 22:45:49 UTC 2016
ssl.sh: #650: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser52 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23494 >/dev/null 2>/dev/null
selfserv with PID 23494 found at Mon Jun  6 22:45:49 UTC 2016
ssl.sh: #651: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 106 bytes
tstclnt: Writing 106 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23494 >/dev/null 2>/dev/null
selfserv with PID 23494 found at Mon Jun  6 22:45:49 UTC 2016
================= CRL Reloaded =============
ssl.sh: #652: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 23494 >/dev/null 2>/dev/null
selfserv with PID 23494 found at Mon Jun  6 22:45:50 UTC 2016
ssl.sh: #653: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23494 >/dev/null 2>/dev/null
selfserv with PID 23494 found at Mon Jun  6 22:45:50 UTC 2016
ssl.sh: #654: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 23494 >/dev/null 2>/dev/null
selfserv with PID 23494 found at Mon Jun  6 22:45:50 UTC 2016
ssl.sh: #655: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser43 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 23494 >/dev/null 2>/dev/null
selfserv with PID 23494 found at Mon Jun  6 22:45:50 UTC 2016
ssl.sh: #656: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser44 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 23494 >/dev/null 2>/dev/null
selfserv with PID 23494 found at Mon Jun  6 22:45:51 UTC 2016
ssl.sh: #657: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser45 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 23494 >/dev/null 2>/dev/null
selfserv with PID 23494 found at Mon Jun  6 22:45:51 UTC 2016
ssl.sh: #658: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser46 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23494 >/dev/null 2>/dev/null
selfserv with PID 23494 found at Mon Jun  6 22:45:51 UTC 2016
ssl.sh: #659: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser47 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 23494 >/dev/null 2>/dev/null
selfserv with PID 23494 found at Mon Jun  6 22:45:51 UTC 2016
ssl.sh: #660: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser48 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 23494 >/dev/null 2>/dev/null
selfserv with PID 23494 found at Mon Jun  6 22:45:52 UTC 2016
ssl.sh: #661: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser49 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 23494 >/dev/null 2>/dev/null
selfserv with PID 23494 found at Mon Jun  6 22:45:52 UTC 2016
ssl.sh: #662: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser50 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 23494 >/dev/null 2>/dev/null
selfserv with PID 23494 found at Mon Jun  6 22:45:52 UTC 2016
ssl.sh: #663: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser51 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23494 >/dev/null 2>/dev/null
selfserv with PID 23494 found at Mon Jun  6 22:45:53 UTC 2016
ssl.sh: #664: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V :ssl3 -n TestUser52 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 23494 >/dev/null 2>/dev/null
selfserv with PID 23494 found at Mon Jun  6 22:45:53 UTC 2016
ssl.sh: #665: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 23494 at Mon Jun  6 22:45:53 UTC 2016
kill -USR1 23494
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23494 killed at Mon Jun  6 22:45:53 UTC 2016
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Mon Jun  6 22:45:53 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:45:53 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 24919 >/dev/null 2>/dev/null
selfserv with PID 24919 found at Mon Jun  6 22:45:53 UTC 2016
selfserv with PID 24919 started at Mon Jun  6 22:45:53 UTC 2016
ssl.sh: skipping  TLS Require client auth (EC) (client auth) (ECC only)
ssl.sh: skipping  SSL3 Require client auth (EC) (client auth) (ECC only)
trying to kill selfserv with PID 24919 at Mon Jun  6 22:45:53 UTC 2016
kill -USR1 24919
./ssl.sh: line 173: 24919 User defined signal 1   ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24919 killed at Mon Jun  6 22:45:53 UTC 2016
selfserv starting at Mon Jun  6 22:45:53 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:45:53 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 24961 >/dev/null 2>/dev/null
selfserv with PID 24961 found at Mon Jun  6 22:45:53 UTC 2016
selfserv with PID 24961 started at Mon Jun  6 22:45:53 UTC 2016
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24961 >/dev/null 2>/dev/null
selfserv with PID 24961 found at Mon Jun  6 22:45:54 UTC 2016
ssl.sh: #666: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24961 >/dev/null 2>/dev/null
selfserv with PID 24961 found at Mon Jun  6 22:45:54 UTC 2016
ssl.sh: #667: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24961 >/dev/null 2>/dev/null
selfserv with PID 24961 found at Mon Jun  6 22:45:54 UTC 2016
ssl.sh: #668: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24961 >/dev/null 2>/dev/null
selfserv with PID 24961 found at Mon Jun  6 22:45:55 UTC 2016
ssl.sh: #669: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24961 >/dev/null 2>/dev/null
selfserv with PID 24961 found at Mon Jun  6 22:45:55 UTC 2016
ssl.sh: #670: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24961 >/dev/null 2>/dev/null
selfserv with PID 24961 found at Mon Jun  6 22:45:55 UTC 2016
ssl.sh: #671: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24961 >/dev/null 2>/dev/null
selfserv with PID 24961 found at Mon Jun  6 22:45:56 UTC 2016
ssl.sh: #672: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24961 >/dev/null 2>/dev/null
selfserv with PID 24961 found at Mon Jun  6 22:45:56 UTC 2016
ssl.sh: #673: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24961 >/dev/null 2>/dev/null
selfserv with PID 24961 found at Mon Jun  6 22:45:56 UTC 2016
ssl.sh: #674: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24961 >/dev/null 2>/dev/null
selfserv with PID 24961 found at Mon Jun  6 22:45:57 UTC 2016
ssl.sh: #675: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24961 >/dev/null 2>/dev/null
selfserv with PID 24961 found at Mon Jun  6 22:45:57 UTC 2016
ssl.sh: #676: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24961 >/dev/null 2>/dev/null
selfserv with PID 24961 found at Mon Jun  6 22:45:57 UTC 2016
ssl.sh: #677: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24961 >/dev/null 2>/dev/null
selfserv with PID 24961 found at Mon Jun  6 22:45:57 UTC 2016
ssl.sh: #678: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 106 bytes
tstclnt: Writing 106 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24961 >/dev/null 2>/dev/null
selfserv with PID 24961 found at Mon Jun  6 22:45:58 UTC 2016
================= CRL Reloaded =============
ssl.sh: #679: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24961 >/dev/null 2>/dev/null
selfserv with PID 24961 found at Mon Jun  6 22:45:58 UTC 2016
ssl.sh: #680: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24961 >/dev/null 2>/dev/null
selfserv with PID 24961 found at Mon Jun  6 22:45:58 UTC 2016
ssl.sh: #681: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24961 >/dev/null 2>/dev/null
selfserv with PID 24961 found at Mon Jun  6 22:45:58 UTC 2016
ssl.sh: #682: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24961 >/dev/null 2>/dev/null
selfserv with PID 24961 found at Mon Jun  6 22:45:59 UTC 2016
ssl.sh: #683: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24961 >/dev/null 2>/dev/null
selfserv with PID 24961 found at Mon Jun  6 22:45:59 UTC 2016
ssl.sh: #684: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24961 >/dev/null 2>/dev/null
selfserv with PID 24961 found at Mon Jun  6 22:45:59 UTC 2016
ssl.sh: #685: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24961 >/dev/null 2>/dev/null
selfserv with PID 24961 found at Mon Jun  6 22:46:00 UTC 2016
ssl.sh: #686: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24961 >/dev/null 2>/dev/null
selfserv with PID 24961 found at Mon Jun  6 22:46:00 UTC 2016
ssl.sh: #687: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24961 >/dev/null 2>/dev/null
selfserv with PID 24961 found at Mon Jun  6 22:46:00 UTC 2016
ssl.sh: #688: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24961 >/dev/null 2>/dev/null
selfserv with PID 24961 found at Mon Jun  6 22:46:00 UTC 2016
ssl.sh: #689: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24961 >/dev/null 2>/dev/null
selfserv with PID 24961 found at Mon Jun  6 22:46:01 UTC 2016
ssl.sh: #690: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24961 >/dev/null 2>/dev/null
selfserv with PID 24961 found at Mon Jun  6 22:46:01 UTC 2016
ssl.sh: #691: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24961 >/dev/null 2>/dev/null
selfserv with PID 24961 found at Mon Jun  6 22:46:01 UTC 2016
ssl.sh: #692: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 106 bytes
tstclnt: Writing 106 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24961 >/dev/null 2>/dev/null
selfserv with PID 24961 found at Mon Jun  6 22:46:02 UTC 2016
================= CRL Reloaded =============
ssl.sh: #693: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24961 >/dev/null 2>/dev/null
selfserv with PID 24961 found at Mon Jun  6 22:46:02 UTC 2016
ssl.sh: #694: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24961 >/dev/null 2>/dev/null
selfserv with PID 24961 found at Mon Jun  6 22:46:02 UTC 2016
ssl.sh: #695: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24961 >/dev/null 2>/dev/null
selfserv with PID 24961 found at Mon Jun  6 22:46:02 UTC 2016
ssl.sh: #696: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24961 >/dev/null 2>/dev/null
selfserv with PID 24961 found at Mon Jun  6 22:46:03 UTC 2016
ssl.sh: #697: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24961 >/dev/null 2>/dev/null
selfserv with PID 24961 found at Mon Jun  6 22:46:03 UTC 2016
ssl.sh: #698: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24961 >/dev/null 2>/dev/null
selfserv with PID 24961 found at Mon Jun  6 22:46:03 UTC 2016
ssl.sh: #699: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24961 >/dev/null 2>/dev/null
selfserv with PID 24961 found at Mon Jun  6 22:46:04 UTC 2016
ssl.sh: #700: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24961 >/dev/null 2>/dev/null
selfserv with PID 24961 found at Mon Jun  6 22:46:04 UTC 2016
ssl.sh: #701: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24961 >/dev/null 2>/dev/null
selfserv with PID 24961 found at Mon Jun  6 22:46:04 UTC 2016
ssl.sh: #702: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24961 >/dev/null 2>/dev/null
selfserv with PID 24961 found at Mon Jun  6 22:46:04 UTC 2016
ssl.sh: #703: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24961 >/dev/null 2>/dev/null
selfserv with PID 24961 found at Mon Jun  6 22:46:05 UTC 2016
ssl.sh: #704: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24961 >/dev/null 2>/dev/null
selfserv with PID 24961 found at Mon Jun  6 22:46:05 UTC 2016
ssl.sh: #705: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24961 >/dev/null 2>/dev/null
selfserv with PID 24961 found at Mon Jun  6 22:46:05 UTC 2016
ssl.sh: #706: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24961 at Mon Jun  6 22:46:06 UTC 2016
kill -USR1 24961
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24961 killed at Mon Jun  6 22:46:06 UTC 2016
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:46:06 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:46:06 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 26390 >/dev/null 2>/dev/null
selfserv with PID 26390 found at Mon Jun  6 22:46:06 UTC 2016
selfserv with PID 26390 started at Mon Jun  6 22:46:06 UTC 2016
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26390 >/dev/null 2>/dev/null
selfserv with PID 26390 found at Mon Jun  6 22:46:06 UTC 2016
ssl.sh: #707: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26390 >/dev/null 2>/dev/null
selfserv with PID 26390 found at Mon Jun  6 22:46:07 UTC 2016
ssl.sh: #708: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26390 >/dev/null 2>/dev/null
selfserv with PID 26390 found at Mon Jun  6 22:46:07 UTC 2016
ssl.sh: #709: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26390 >/dev/null 2>/dev/null
selfserv with PID 26390 found at Mon Jun  6 22:46:07 UTC 2016
ssl.sh: #710: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26390 >/dev/null 2>/dev/null
selfserv with PID 26390 found at Mon Jun  6 22:46:07 UTC 2016
ssl.sh: #711: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26390 >/dev/null 2>/dev/null
selfserv with PID 26390 found at Mon Jun  6 22:46:08 UTC 2016
ssl.sh: #712: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26390 >/dev/null 2>/dev/null
selfserv with PID 26390 found at Mon Jun  6 22:46:08 UTC 2016
ssl.sh: #713: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26390 >/dev/null 2>/dev/null
selfserv with PID 26390 found at Mon Jun  6 22:46:08 UTC 2016
ssl.sh: #714: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26390 >/dev/null 2>/dev/null
selfserv with PID 26390 found at Mon Jun  6 22:46:09 UTC 2016
ssl.sh: #715: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26390 >/dev/null 2>/dev/null
selfserv with PID 26390 found at Mon Jun  6 22:46:09 UTC 2016
ssl.sh: #716: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26390 >/dev/null 2>/dev/null
selfserv with PID 26390 found at Mon Jun  6 22:46:09 UTC 2016
ssl.sh: #717: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26390 >/dev/null 2>/dev/null
selfserv with PID 26390 found at Mon Jun  6 22:46:10 UTC 2016
ssl.sh: #718: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26390 >/dev/null 2>/dev/null
selfserv with PID 26390 found at Mon Jun  6 22:46:10 UTC 2016
ssl.sh: #719: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 106 bytes
tstclnt: Writing 106 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26390 >/dev/null 2>/dev/null
selfserv with PID 26390 found at Mon Jun  6 22:46:10 UTC 2016
================= CRL Reloaded =============
ssl.sh: #720: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26390 >/dev/null 2>/dev/null
selfserv with PID 26390 found at Mon Jun  6 22:46:10 UTC 2016
ssl.sh: #721: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26390 >/dev/null 2>/dev/null
selfserv with PID 26390 found at Mon Jun  6 22:46:11 UTC 2016
ssl.sh: #722: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26390 >/dev/null 2>/dev/null
selfserv with PID 26390 found at Mon Jun  6 22:46:11 UTC 2016
ssl.sh: #723: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26390 >/dev/null 2>/dev/null
selfserv with PID 26390 found at Mon Jun  6 22:46:11 UTC 2016
ssl.sh: #724: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26390 >/dev/null 2>/dev/null
selfserv with PID 26390 found at Mon Jun  6 22:46:11 UTC 2016
ssl.sh: #725: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26390 >/dev/null 2>/dev/null
selfserv with PID 26390 found at Mon Jun  6 22:46:12 UTC 2016
ssl.sh: #726: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26390 >/dev/null 2>/dev/null
selfserv with PID 26390 found at Mon Jun  6 22:46:12 UTC 2016
ssl.sh: #727: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26390 >/dev/null 2>/dev/null
selfserv with PID 26390 found at Mon Jun  6 22:46:12 UTC 2016
ssl.sh: #728: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26390 >/dev/null 2>/dev/null
selfserv with PID 26390 found at Mon Jun  6 22:46:13 UTC 2016
ssl.sh: #729: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26390 >/dev/null 2>/dev/null
selfserv with PID 26390 found at Mon Jun  6 22:46:13 UTC 2016
ssl.sh: #730: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26390 >/dev/null 2>/dev/null
selfserv with PID 26390 found at Mon Jun  6 22:46:13 UTC 2016
ssl.sh: #731: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26390 >/dev/null 2>/dev/null
selfserv with PID 26390 found at Mon Jun  6 22:46:14 UTC 2016
ssl.sh: #732: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26390 >/dev/null 2>/dev/null
selfserv with PID 26390 found at Mon Jun  6 22:46:14 UTC 2016
ssl.sh: #733: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 106 bytes
tstclnt: Writing 106 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26390 >/dev/null 2>/dev/null
selfserv with PID 26390 found at Mon Jun  6 22:46:14 UTC 2016
================= CRL Reloaded =============
ssl.sh: #734: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26390 >/dev/null 2>/dev/null
selfserv with PID 26390 found at Mon Jun  6 22:46:14 UTC 2016
ssl.sh: #735: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26390 >/dev/null 2>/dev/null
selfserv with PID 26390 found at Mon Jun  6 22:46:15 UTC 2016
ssl.sh: #736: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26390 >/dev/null 2>/dev/null
selfserv with PID 26390 found at Mon Jun  6 22:46:15 UTC 2016
ssl.sh: #737: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26390 >/dev/null 2>/dev/null
selfserv with PID 26390 found at Mon Jun  6 22:46:15 UTC 2016
ssl.sh: #738: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26390 >/dev/null 2>/dev/null
selfserv with PID 26390 found at Mon Jun  6 22:46:15 UTC 2016
ssl.sh: #739: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26390 >/dev/null 2>/dev/null
selfserv with PID 26390 found at Mon Jun  6 22:46:16 UTC 2016
ssl.sh: #740: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26390 >/dev/null 2>/dev/null
selfserv with PID 26390 found at Mon Jun  6 22:46:16 UTC 2016
ssl.sh: #741: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26390 >/dev/null 2>/dev/null
selfserv with PID 26390 found at Mon Jun  6 22:46:16 UTC 2016
ssl.sh: #742: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26390 >/dev/null 2>/dev/null
selfserv with PID 26390 found at Mon Jun  6 22:46:17 UTC 2016
ssl.sh: #743: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26390 >/dev/null 2>/dev/null
selfserv with PID 26390 found at Mon Jun  6 22:46:17 UTC 2016
ssl.sh: #744: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26390 >/dev/null 2>/dev/null
selfserv with PID 26390 found at Mon Jun  6 22:46:17 UTC 2016
ssl.sh: #745: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26390 >/dev/null 2>/dev/null
selfserv with PID 26390 found at Mon Jun  6 22:46:17 UTC 2016
ssl.sh: #746: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26390 >/dev/null 2>/dev/null
selfserv with PID 26390 found at Mon Jun  6 22:46:18 UTC 2016
ssl.sh: #747: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26390 at Mon Jun  6 22:46:18 UTC 2016
kill -USR1 26390
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26390 killed at Mon Jun  6 22:46:18 UTC 2016
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:46:18 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:46:18 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 27814 >/dev/null 2>/dev/null
selfserv with PID 27814 found at Mon Jun  6 22:46:18 UTC 2016
selfserv with PID 27814 started at Mon Jun  6 22:46:18 UTC 2016
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27814 >/dev/null 2>/dev/null
selfserv with PID 27814 found at Mon Jun  6 22:46:19 UTC 2016
ssl.sh: #748: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27814 >/dev/null 2>/dev/null
selfserv with PID 27814 found at Mon Jun  6 22:46:19 UTC 2016
ssl.sh: #749: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27814 >/dev/null 2>/dev/null
selfserv with PID 27814 found at Mon Jun  6 22:46:19 UTC 2016
ssl.sh: #750: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27814 >/dev/null 2>/dev/null
selfserv with PID 27814 found at Mon Jun  6 22:46:19 UTC 2016
ssl.sh: #751: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27814 >/dev/null 2>/dev/null
selfserv with PID 27814 found at Mon Jun  6 22:46:20 UTC 2016
ssl.sh: #752: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27814 >/dev/null 2>/dev/null
selfserv with PID 27814 found at Mon Jun  6 22:46:20 UTC 2016
ssl.sh: #753: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27814 >/dev/null 2>/dev/null
selfserv with PID 27814 found at Mon Jun  6 22:46:20 UTC 2016
ssl.sh: #754: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27814 >/dev/null 2>/dev/null
selfserv with PID 27814 found at Mon Jun  6 22:46:21 UTC 2016
ssl.sh: #755: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27814 >/dev/null 2>/dev/null
selfserv with PID 27814 found at Mon Jun  6 22:46:21 UTC 2016
ssl.sh: #756: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27814 >/dev/null 2>/dev/null
selfserv with PID 27814 found at Mon Jun  6 22:46:21 UTC 2016
ssl.sh: #757: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27814 >/dev/null 2>/dev/null
selfserv with PID 27814 found at Mon Jun  6 22:46:22 UTC 2016
ssl.sh: #758: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27814 >/dev/null 2>/dev/null
selfserv with PID 27814 found at Mon Jun  6 22:46:22 UTC 2016
ssl.sh: #759: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27814 >/dev/null 2>/dev/null
selfserv with PID 27814 found at Mon Jun  6 22:46:22 UTC 2016
ssl.sh: #760: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 106 bytes
tstclnt: Writing 106 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27814 >/dev/null 2>/dev/null
selfserv with PID 27814 found at Mon Jun  6 22:46:22 UTC 2016
================= CRL Reloaded =============
ssl.sh: #761: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27814 >/dev/null 2>/dev/null
selfserv with PID 27814 found at Mon Jun  6 22:46:23 UTC 2016
ssl.sh: #762: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27814 >/dev/null 2>/dev/null
selfserv with PID 27814 found at Mon Jun  6 22:46:23 UTC 2016
ssl.sh: #763: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27814 >/dev/null 2>/dev/null
selfserv with PID 27814 found at Mon Jun  6 22:46:23 UTC 2016
ssl.sh: #764: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27814 >/dev/null 2>/dev/null
selfserv with PID 27814 found at Mon Jun  6 22:46:23 UTC 2016
ssl.sh: #765: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27814 >/dev/null 2>/dev/null
selfserv with PID 27814 found at Mon Jun  6 22:46:24 UTC 2016
ssl.sh: #766: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27814 >/dev/null 2>/dev/null
selfserv with PID 27814 found at Mon Jun  6 22:46:24 UTC 2016
ssl.sh: #767: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27814 >/dev/null 2>/dev/null
selfserv with PID 27814 found at Mon Jun  6 22:46:24 UTC 2016
ssl.sh: #768: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27814 >/dev/null 2>/dev/null
selfserv with PID 27814 found at Mon Jun  6 22:46:25 UTC 2016
ssl.sh: #769: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27814 >/dev/null 2>/dev/null
selfserv with PID 27814 found at Mon Jun  6 22:46:25 UTC 2016
ssl.sh: #770: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27814 >/dev/null 2>/dev/null
selfserv with PID 27814 found at Mon Jun  6 22:46:25 UTC 2016
ssl.sh: #771: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27814 >/dev/null 2>/dev/null
selfserv with PID 27814 found at Mon Jun  6 22:46:26 UTC 2016
ssl.sh: #772: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27814 >/dev/null 2>/dev/null
selfserv with PID 27814 found at Mon Jun  6 22:46:26 UTC 2016
ssl.sh: #773: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27814 >/dev/null 2>/dev/null
selfserv with PID 27814 found at Mon Jun  6 22:46:26 UTC 2016
ssl.sh: #774: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 106 bytes
tstclnt: Writing 106 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27814 >/dev/null 2>/dev/null
selfserv with PID 27814 found at Mon Jun  6 22:46:26 UTC 2016
================= CRL Reloaded =============
ssl.sh: #775: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27814 >/dev/null 2>/dev/null
selfserv with PID 27814 found at Mon Jun  6 22:46:27 UTC 2016
ssl.sh: #776: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27814 >/dev/null 2>/dev/null
selfserv with PID 27814 found at Mon Jun  6 22:46:27 UTC 2016
ssl.sh: #777: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27814 >/dev/null 2>/dev/null
selfserv with PID 27814 found at Mon Jun  6 22:46:27 UTC 2016
ssl.sh: #778: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27814 >/dev/null 2>/dev/null
selfserv with PID 27814 found at Mon Jun  6 22:46:27 UTC 2016
ssl.sh: #779: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27814 >/dev/null 2>/dev/null
selfserv with PID 27814 found at Mon Jun  6 22:46:28 UTC 2016
ssl.sh: #780: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27814 >/dev/null 2>/dev/null
selfserv with PID 27814 found at Mon Jun  6 22:46:28 UTC 2016
ssl.sh: #781: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27814 >/dev/null 2>/dev/null
selfserv with PID 27814 found at Mon Jun  6 22:46:28 UTC 2016
ssl.sh: #782: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27814 >/dev/null 2>/dev/null
selfserv with PID 27814 found at Mon Jun  6 22:46:29 UTC 2016
ssl.sh: #783: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27814 >/dev/null 2>/dev/null
selfserv with PID 27814 found at Mon Jun  6 22:46:29 UTC 2016
ssl.sh: #784: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27814 >/dev/null 2>/dev/null
selfserv with PID 27814 found at Mon Jun  6 22:46:29 UTC 2016
ssl.sh: #785: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27814 >/dev/null 2>/dev/null
selfserv with PID 27814 found at Mon Jun  6 22:46:29 UTC 2016
ssl.sh: #786: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27814 >/dev/null 2>/dev/null
selfserv with PID 27814 found at Mon Jun  6 22:46:30 UTC 2016
ssl.sh: #787: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27814 >/dev/null 2>/dev/null
selfserv with PID 27814 found at Mon Jun  6 22:46:30 UTC 2016
ssl.sh: #788: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27814 at Mon Jun  6 22:46:30 UTC 2016
kill -USR1 27814
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27814 killed at Mon Jun  6 22:46:30 UTC 2016
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:46:30 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:46:30 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 29236 >/dev/null 2>/dev/null
selfserv with PID 29236 found at Mon Jun  6 22:46:30 UTC 2016
selfserv with PID 29236 started at Mon Jun  6 22:46:30 UTC 2016
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only)
trying to kill selfserv with PID 29236 at Mon Jun  6 22:46:30 UTC 2016
kill -USR1 29236
./ssl.sh: line 173: 29236 User defined signal 1   ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29236 killed at Mon Jun  6 22:46:30 UTC 2016
selfserv starting at Mon Jun  6 22:46:31 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:46:31 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 29278 >/dev/null 2>/dev/null
selfserv with PID 29278 found at Mon Jun  6 22:46:31 UTC 2016
selfserv with PID 29278 started at Mon Jun  6 22:46:31 UTC 2016
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29278 >/dev/null 2>/dev/null
selfserv with PID 29278 found at Mon Jun  6 22:46:31 UTC 2016
ssl.sh: #789: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29278 >/dev/null 2>/dev/null
selfserv with PID 29278 found at Mon Jun  6 22:46:31 UTC 2016
ssl.sh: #790: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29278 >/dev/null 2>/dev/null
selfserv with PID 29278 found at Mon Jun  6 22:46:32 UTC 2016
ssl.sh: #791: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29278 >/dev/null 2>/dev/null
selfserv with PID 29278 found at Mon Jun  6 22:46:32 UTC 2016
ssl.sh: #792: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29278 >/dev/null 2>/dev/null
selfserv with PID 29278 found at Mon Jun  6 22:46:32 UTC 2016
ssl.sh: #793: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29278 >/dev/null 2>/dev/null
selfserv with PID 29278 found at Mon Jun  6 22:46:33 UTC 2016
ssl.sh: #794: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29278 >/dev/null 2>/dev/null
selfserv with PID 29278 found at Mon Jun  6 22:46:33 UTC 2016
ssl.sh: #795: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29278 >/dev/null 2>/dev/null
selfserv with PID 29278 found at Mon Jun  6 22:46:33 UTC 2016
ssl.sh: #796: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29278 >/dev/null 2>/dev/null
selfserv with PID 29278 found at Mon Jun  6 22:46:33 UTC 2016
ssl.sh: #797: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29278 >/dev/null 2>/dev/null
selfserv with PID 29278 found at Mon Jun  6 22:46:34 UTC 2016
ssl.sh: #798: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29278 >/dev/null 2>/dev/null
selfserv with PID 29278 found at Mon Jun  6 22:46:34 UTC 2016
ssl.sh: #799: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29278 >/dev/null 2>/dev/null
selfserv with PID 29278 found at Mon Jun  6 22:46:34 UTC 2016
ssl.sh: #800: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29278 >/dev/null 2>/dev/null
selfserv with PID 29278 found at Mon Jun  6 22:46:35 UTC 2016
ssl.sh: #801: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 106 bytes
tstclnt: Writing 106 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29278 >/dev/null 2>/dev/null
selfserv with PID 29278 found at Mon Jun  6 22:46:35 UTC 2016
================= CRL Reloaded =============
ssl.sh: #802: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29278 >/dev/null 2>/dev/null
selfserv with PID 29278 found at Mon Jun  6 22:46:35 UTC 2016
ssl.sh: #803: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29278 >/dev/null 2>/dev/null
selfserv with PID 29278 found at Mon Jun  6 22:46:35 UTC 2016
ssl.sh: #804: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29278 >/dev/null 2>/dev/null
selfserv with PID 29278 found at Mon Jun  6 22:46:36 UTC 2016
ssl.sh: #805: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29278 >/dev/null 2>/dev/null
selfserv with PID 29278 found at Mon Jun  6 22:46:36 UTC 2016
ssl.sh: #806: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29278 >/dev/null 2>/dev/null
selfserv with PID 29278 found at Mon Jun  6 22:46:36 UTC 2016
ssl.sh: #807: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29278 >/dev/null 2>/dev/null
selfserv with PID 29278 found at Mon Jun  6 22:46:37 UTC 2016
ssl.sh: #808: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29278 >/dev/null 2>/dev/null
selfserv with PID 29278 found at Mon Jun  6 22:46:37 UTC 2016
ssl.sh: #809: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29278 >/dev/null 2>/dev/null
selfserv with PID 29278 found at Mon Jun  6 22:46:37 UTC 2016
ssl.sh: #810: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29278 >/dev/null 2>/dev/null
selfserv with PID 29278 found at Mon Jun  6 22:46:38 UTC 2016
ssl.sh: #811: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29278 >/dev/null 2>/dev/null
selfserv with PID 29278 found at Mon Jun  6 22:46:38 UTC 2016
ssl.sh: #812: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29278 >/dev/null 2>/dev/null
selfserv with PID 29278 found at Mon Jun  6 22:46:38 UTC 2016
ssl.sh: #813: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29278 >/dev/null 2>/dev/null
selfserv with PID 29278 found at Mon Jun  6 22:46:39 UTC 2016
ssl.sh: #814: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29278 >/dev/null 2>/dev/null
selfserv with PID 29278 found at Mon Jun  6 22:46:39 UTC 2016
ssl.sh: #815: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 106 bytes
tstclnt: Writing 106 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29278 >/dev/null 2>/dev/null
selfserv with PID 29278 found at Mon Jun  6 22:46:39 UTC 2016
================= CRL Reloaded =============
ssl.sh: #816: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29278 >/dev/null 2>/dev/null
selfserv with PID 29278 found at Mon Jun  6 22:46:39 UTC 2016
ssl.sh: #817: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29278 >/dev/null 2>/dev/null
selfserv with PID 29278 found at Mon Jun  6 22:46:40 UTC 2016
ssl.sh: #818: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29278 >/dev/null 2>/dev/null
selfserv with PID 29278 found at Mon Jun  6 22:46:40 UTC 2016
ssl.sh: #819: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29278 >/dev/null 2>/dev/null
selfserv with PID 29278 found at Mon Jun  6 22:46:40 UTC 2016
ssl.sh: #820: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29278 >/dev/null 2>/dev/null
selfserv with PID 29278 found at Mon Jun  6 22:46:40 UTC 2016
ssl.sh: #821: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29278 >/dev/null 2>/dev/null
selfserv with PID 29278 found at Mon Jun  6 22:46:41 UTC 2016
ssl.sh: #822: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29278 >/dev/null 2>/dev/null
selfserv with PID 29278 found at Mon Jun  6 22:46:41 UTC 2016
ssl.sh: #823: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29278 >/dev/null 2>/dev/null
selfserv with PID 29278 found at Mon Jun  6 22:46:41 UTC 2016
ssl.sh: #824: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29278 >/dev/null 2>/dev/null
selfserv with PID 29278 found at Mon Jun  6 22:46:42 UTC 2016
ssl.sh: #825: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29278 >/dev/null 2>/dev/null
selfserv with PID 29278 found at Mon Jun  6 22:46:42 UTC 2016
ssl.sh: #826: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29278 >/dev/null 2>/dev/null
selfserv with PID 29278 found at Mon Jun  6 22:46:42 UTC 2016
ssl.sh: #827: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29278 >/dev/null 2>/dev/null
selfserv with PID 29278 found at Mon Jun  6 22:46:42 UTC 2016
ssl.sh: #828: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29278 >/dev/null 2>/dev/null
selfserv with PID 29278 found at Mon Jun  6 22:46:43 UTC 2016
ssl.sh: #829: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29278 at Mon Jun  6 22:46:43 UTC 2016
kill -USR1 29278
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29278 killed at Mon Jun  6 22:46:43 UTC 2016
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:46:43 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:46:43 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 30701 >/dev/null 2>/dev/null
selfserv with PID 30701 found at Mon Jun  6 22:46:43 UTC 2016
selfserv with PID 30701 started at Mon Jun  6 22:46:43 UTC 2016
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30701 >/dev/null 2>/dev/null
selfserv with PID 30701 found at Mon Jun  6 22:46:44 UTC 2016
ssl.sh: #830: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30701 >/dev/null 2>/dev/null
selfserv with PID 30701 found at Mon Jun  6 22:46:44 UTC 2016
ssl.sh: #831: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30701 >/dev/null 2>/dev/null
selfserv with PID 30701 found at Mon Jun  6 22:46:44 UTC 2016
ssl.sh: #832: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30701 >/dev/null 2>/dev/null
selfserv with PID 30701 found at Mon Jun  6 22:46:44 UTC 2016
ssl.sh: #833: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30701 >/dev/null 2>/dev/null
selfserv with PID 30701 found at Mon Jun  6 22:46:45 UTC 2016
ssl.sh: #834: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30701 >/dev/null 2>/dev/null
selfserv with PID 30701 found at Mon Jun  6 22:46:45 UTC 2016
ssl.sh: #835: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30701 >/dev/null 2>/dev/null
selfserv with PID 30701 found at Mon Jun  6 22:46:45 UTC 2016
ssl.sh: #836: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30701 >/dev/null 2>/dev/null
selfserv with PID 30701 found at Mon Jun  6 22:46:46 UTC 2016
ssl.sh: #837: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30701 >/dev/null 2>/dev/null
selfserv with PID 30701 found at Mon Jun  6 22:46:46 UTC 2016
ssl.sh: #838: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30701 >/dev/null 2>/dev/null
selfserv with PID 30701 found at Mon Jun  6 22:46:46 UTC 2016
ssl.sh: #839: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30701 >/dev/null 2>/dev/null
selfserv with PID 30701 found at Mon Jun  6 22:46:47 UTC 2016
ssl.sh: #840: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30701 >/dev/null 2>/dev/null
selfserv with PID 30701 found at Mon Jun  6 22:46:47 UTC 2016
ssl.sh: #841: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30701 >/dev/null 2>/dev/null
selfserv with PID 30701 found at Mon Jun  6 22:46:47 UTC 2016
ssl.sh: #842: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 106 bytes
tstclnt: Writing 106 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30701 >/dev/null 2>/dev/null
selfserv with PID 30701 found at Mon Jun  6 22:46:47 UTC 2016
================= CRL Reloaded =============
ssl.sh: #843: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30701 >/dev/null 2>/dev/null
selfserv with PID 30701 found at Mon Jun  6 22:46:48 UTC 2016
ssl.sh: #844: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30701 >/dev/null 2>/dev/null
selfserv with PID 30701 found at Mon Jun  6 22:46:48 UTC 2016
ssl.sh: #845: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30701 >/dev/null 2>/dev/null
selfserv with PID 30701 found at Mon Jun  6 22:46:48 UTC 2016
ssl.sh: #846: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30701 >/dev/null 2>/dev/null
selfserv with PID 30701 found at Mon Jun  6 22:46:48 UTC 2016
ssl.sh: #847: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30701 >/dev/null 2>/dev/null
selfserv with PID 30701 found at Mon Jun  6 22:46:49 UTC 2016
ssl.sh: #848: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30701 >/dev/null 2>/dev/null
selfserv with PID 30701 found at Mon Jun  6 22:46:49 UTC 2016
ssl.sh: #849: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30701 >/dev/null 2>/dev/null
selfserv with PID 30701 found at Mon Jun  6 22:46:49 UTC 2016
ssl.sh: #850: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30701 >/dev/null 2>/dev/null
selfserv with PID 30701 found at Mon Jun  6 22:46:50 UTC 2016
ssl.sh: #851: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30701 >/dev/null 2>/dev/null
selfserv with PID 30701 found at Mon Jun  6 22:46:50 UTC 2016
ssl.sh: #852: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30701 >/dev/null 2>/dev/null
selfserv with PID 30701 found at Mon Jun  6 22:46:50 UTC 2016
ssl.sh: #853: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30701 >/dev/null 2>/dev/null
selfserv with PID 30701 found at Mon Jun  6 22:46:50 UTC 2016
ssl.sh: #854: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30701 >/dev/null 2>/dev/null
selfserv with PID 30701 found at Mon Jun  6 22:46:51 UTC 2016
ssl.sh: #855: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30701 >/dev/null 2>/dev/null
selfserv with PID 30701 found at Mon Jun  6 22:46:51 UTC 2016
ssl.sh: #856: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 106 bytes
tstclnt: Writing 106 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30701 >/dev/null 2>/dev/null
selfserv with PID 30701 found at Mon Jun  6 22:46:51 UTC 2016
================= CRL Reloaded =============
ssl.sh: #857: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30701 >/dev/null 2>/dev/null
selfserv with PID 30701 found at Mon Jun  6 22:46:52 UTC 2016
ssl.sh: #858: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30701 >/dev/null 2>/dev/null
selfserv with PID 30701 found at Mon Jun  6 22:46:52 UTC 2016
ssl.sh: #859: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30701 >/dev/null 2>/dev/null
selfserv with PID 30701 found at Mon Jun  6 22:46:52 UTC 2016
ssl.sh: #860: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30701 >/dev/null 2>/dev/null
selfserv with PID 30701 found at Mon Jun  6 22:46:52 UTC 2016
ssl.sh: #861: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30701 >/dev/null 2>/dev/null
selfserv with PID 30701 found at Mon Jun  6 22:46:53 UTC 2016
ssl.sh: #862: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30701 >/dev/null 2>/dev/null
selfserv with PID 30701 found at Mon Jun  6 22:46:53 UTC 2016
ssl.sh: #863: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30701 >/dev/null 2>/dev/null
selfserv with PID 30701 found at Mon Jun  6 22:46:53 UTC 2016
ssl.sh: #864: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30701 >/dev/null 2>/dev/null
selfserv with PID 30701 found at Mon Jun  6 22:46:54 UTC 2016
ssl.sh: #865: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30701 >/dev/null 2>/dev/null
selfserv with PID 30701 found at Mon Jun  6 22:46:54 UTC 2016
ssl.sh: #866: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30701 >/dev/null 2>/dev/null
selfserv with PID 30701 found at Mon Jun  6 22:46:54 UTC 2016
ssl.sh: #867: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30701 >/dev/null 2>/dev/null
selfserv with PID 30701 found at Mon Jun  6 22:46:54 UTC 2016
ssl.sh: #868: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30701 >/dev/null 2>/dev/null
selfserv with PID 30701 found at Mon Jun  6 22:46:55 UTC 2016
ssl.sh: #869: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30701 >/dev/null 2>/dev/null
selfserv with PID 30701 found at Mon Jun  6 22:46:55 UTC 2016
ssl.sh: #870: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 30701 at Mon Jun  6 22:46:55 UTC 2016
kill -USR1 30701
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30701 killed at Mon Jun  6 22:46:55 UTC 2016
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:46:55 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:46:55 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 32125 >/dev/null 2>/dev/null
selfserv with PID 32125 found at Mon Jun  6 22:46:55 UTC 2016
selfserv with PID 32125 started at Mon Jun  6 22:46:55 UTC 2016
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32125 >/dev/null 2>/dev/null
selfserv with PID 32125 found at Mon Jun  6 22:46:56 UTC 2016
ssl.sh: #871: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32125 >/dev/null 2>/dev/null
selfserv with PID 32125 found at Mon Jun  6 22:46:56 UTC 2016
ssl.sh: #872: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32125 >/dev/null 2>/dev/null
selfserv with PID 32125 found at Mon Jun  6 22:46:56 UTC 2016
ssl.sh: #873: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32125 >/dev/null 2>/dev/null
selfserv with PID 32125 found at Mon Jun  6 22:46:57 UTC 2016
ssl.sh: #874: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32125 >/dev/null 2>/dev/null
selfserv with PID 32125 found at Mon Jun  6 22:46:57 UTC 2016
ssl.sh: #875: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32125 >/dev/null 2>/dev/null
selfserv with PID 32125 found at Mon Jun  6 22:46:57 UTC 2016
ssl.sh: #876: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32125 >/dev/null 2>/dev/null
selfserv with PID 32125 found at Mon Jun  6 22:46:58 UTC 2016
ssl.sh: #877: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32125 >/dev/null 2>/dev/null
selfserv with PID 32125 found at Mon Jun  6 22:46:58 UTC 2016
ssl.sh: #878: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32125 >/dev/null 2>/dev/null
selfserv with PID 32125 found at Mon Jun  6 22:46:58 UTC 2016
ssl.sh: #879: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32125 >/dev/null 2>/dev/null
selfserv with PID 32125 found at Mon Jun  6 22:46:58 UTC 2016
ssl.sh: #880: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32125 >/dev/null 2>/dev/null
selfserv with PID 32125 found at Mon Jun  6 22:46:59 UTC 2016
ssl.sh: #881: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32125 >/dev/null 2>/dev/null
selfserv with PID 32125 found at Mon Jun  6 22:46:59 UTC 2016
ssl.sh: #882: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32125 >/dev/null 2>/dev/null
selfserv with PID 32125 found at Mon Jun  6 22:46:59 UTC 2016
ssl.sh: #883: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 106 bytes
tstclnt: Writing 106 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32125 >/dev/null 2>/dev/null
selfserv with PID 32125 found at Mon Jun  6 22:47:00 UTC 2016
================= CRL Reloaded =============
ssl.sh: #884: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32125 >/dev/null 2>/dev/null
selfserv with PID 32125 found at Mon Jun  6 22:47:00 UTC 2016
ssl.sh: #885: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32125 >/dev/null 2>/dev/null
selfserv with PID 32125 found at Mon Jun  6 22:47:00 UTC 2016
ssl.sh: #886: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32125 >/dev/null 2>/dev/null
selfserv with PID 32125 found at Mon Jun  6 22:47:00 UTC 2016
ssl.sh: #887: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32125 >/dev/null 2>/dev/null
selfserv with PID 32125 found at Mon Jun  6 22:47:01 UTC 2016
ssl.sh: #888: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32125 >/dev/null 2>/dev/null
selfserv with PID 32125 found at Mon Jun  6 22:47:01 UTC 2016
ssl.sh: #889: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32125 >/dev/null 2>/dev/null
selfserv with PID 32125 found at Mon Jun  6 22:47:01 UTC 2016
ssl.sh: #890: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32125 >/dev/null 2>/dev/null
selfserv with PID 32125 found at Mon Jun  6 22:47:02 UTC 2016
ssl.sh: #891: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32125 >/dev/null 2>/dev/null
selfserv with PID 32125 found at Mon Jun  6 22:47:02 UTC 2016
ssl.sh: #892: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32125 >/dev/null 2>/dev/null
selfserv with PID 32125 found at Mon Jun  6 22:47:02 UTC 2016
ssl.sh: #893: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32125 >/dev/null 2>/dev/null
selfserv with PID 32125 found at Mon Jun  6 22:47:02 UTC 2016
ssl.sh: #894: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32125 >/dev/null 2>/dev/null
selfserv with PID 32125 found at Mon Jun  6 22:47:03 UTC 2016
ssl.sh: #895: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32125 >/dev/null 2>/dev/null
selfserv with PID 32125 found at Mon Jun  6 22:47:03 UTC 2016
ssl.sh: #896: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32125 >/dev/null 2>/dev/null
selfserv with PID 32125 found at Mon Jun  6 22:47:03 UTC 2016
ssl.sh: #897: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 106 bytes
tstclnt: Writing 106 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32125 >/dev/null 2>/dev/null
selfserv with PID 32125 found at Mon Jun  6 22:47:04 UTC 2016
================= CRL Reloaded =============
ssl.sh: #898: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32125 >/dev/null 2>/dev/null
selfserv with PID 32125 found at Mon Jun  6 22:47:04 UTC 2016
ssl.sh: #899: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32125 >/dev/null 2>/dev/null
selfserv with PID 32125 found at Mon Jun  6 22:47:04 UTC 2016
ssl.sh: #900: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32125 >/dev/null 2>/dev/null
selfserv with PID 32125 found at Mon Jun  6 22:47:04 UTC 2016
ssl.sh: #901: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32125 >/dev/null 2>/dev/null
selfserv with PID 32125 found at Mon Jun  6 22:47:05 UTC 2016
ssl.sh: #902: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32125 >/dev/null 2>/dev/null
selfserv with PID 32125 found at Mon Jun  6 22:47:05 UTC 2016
ssl.sh: #903: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32125 >/dev/null 2>/dev/null
selfserv with PID 32125 found at Mon Jun  6 22:47:05 UTC 2016
ssl.sh: #904: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32125 >/dev/null 2>/dev/null
selfserv with PID 32125 found at Mon Jun  6 22:47:06 UTC 2016
ssl.sh: #905: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32125 >/dev/null 2>/dev/null
selfserv with PID 32125 found at Mon Jun  6 22:47:06 UTC 2016
ssl.sh: #906: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32125 >/dev/null 2>/dev/null
selfserv with PID 32125 found at Mon Jun  6 22:47:06 UTC 2016
ssl.sh: #907: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32125 >/dev/null 2>/dev/null
selfserv with PID 32125 found at Mon Jun  6 22:47:06 UTC 2016
ssl.sh: #908: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32125 >/dev/null 2>/dev/null
selfserv with PID 32125 found at Mon Jun  6 22:47:07 UTC 2016
ssl.sh: #909: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32125 >/dev/null 2>/dev/null
selfserv with PID 32125 found at Mon Jun  6 22:47:07 UTC 2016
ssl.sh: #910: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32125 >/dev/null 2>/dev/null
selfserv with PID 32125 found at Mon Jun  6 22:47:07 UTC 2016
ssl.sh: #911: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32125 at Mon Jun  6 22:47:07 UTC 2016
kill -USR1 32125
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32125 killed at Mon Jun  6 22:47:08 UTC 2016
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:47:08 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:47:08 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 1088 >/dev/null 2>/dev/null
selfserv with PID 1088 found at Mon Jun  6 22:47:08 UTC 2016
selfserv with PID 1088 started at Mon Jun  6 22:47:08 UTC 2016
ssl.sh: skipping  TLS Require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping  TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping  SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only)
trying to kill selfserv with PID 1088 at Mon Jun  6 22:47:08 UTC 2016
kill -USR1 1088
./ssl.sh: line 173:  1088 User defined signal 1   ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1088 killed at Mon Jun  6 22:47:08 UTC 2016
ssl.sh: SSL Cipher Coverage  - server bypass/client normal  ===============================
selfserv starting at Mon Jun  6 22:47:08 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:47:08 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:08 UTC 2016
selfserv with PID 1136 started at Mon Jun  6 22:47:08 UTC 2016
ssl.sh: running SSL2_RC4_128_WITH_MD5 ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:08 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c A -V ssl2:ssl3 -O  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #912: SSL2_RC4_128_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC4_128_EXPORT40_WITH_MD5 ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:09 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c B -V ssl2:tls1.0 -O  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #913: SSL2_RC4_128_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC2_128_CBC_WITH_MD5 ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:09 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c C -V ssl2:tls1.0 -O  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 128-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #914: SSL2_RC2_128_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:09 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c D -V ssl2:ssl3 -O  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #915: SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_DES_64_CBC_WITH_MD5 ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:09 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c E -V ssl2:tls1.0 -O  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 56-bit DES with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #916: SSL2_DES_64_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_DES_192_EDE3_CBC_WITH_MD5 ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:10 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c F -V ssl2:ssl3 -O  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 112-bit 3DES with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #917: SSL2_DES_192_EDE3_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC4_128_EXPORT40_WITH_MD5 ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:10 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c B -V ssl2:tls1.1 -O  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #918: SSL2_RC4_128_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC2_128_CBC_WITH_MD5 ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:10 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c C -V ssl2:tls1.1 -O  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 128-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #919: SSL2_RC2_128_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_DES_64_CBC_WITH_MD5 ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:10 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c E -V ssl2:tls1.1 -O  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 56-bit DES with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #920: SSL2_DES_64_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:11 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #921: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:11 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #922: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:11 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #923: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:11 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c f -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #924: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:11 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c g -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #925: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:12 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #926: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:12 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #927: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:12 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #928: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:12 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12229:
SSL peer was not expecting a handshake message it received.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: write to SSL socket failed: SSL received an unexpected Server Hello Done handshake message.
tstclnt: exiting with return code 254
ssl.sh: #929: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 254, expected is 0 - FAILED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:12 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12229:
SSL peer was not expecting a handshake message it received.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: write to SSL socket failed: SSL received an unexpected Server Hello Done handshake message.
tstclnt: exiting with return code 254
ssl.sh: #930: SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 254, expected is 0 - FAILED
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:12 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #931: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:13 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #932: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:13 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #933: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:13 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #934: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:13 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.0   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #935: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:14 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.0   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #936: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:14 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.0   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #937: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:14 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c f -V ssl3:tls1.0   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #938: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:14 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c g -V ssl3:tls1.0   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #939: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:14 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.0   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #940: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:14 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.0   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #941: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:15 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.0   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #942: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:15 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:tls1.0   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12229:
SSL peer was not expecting a handshake message it received.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: write to SSL socket failed: SSL received an unexpected Server Hello Done handshake message.
tstclnt: exiting with return code 254
ssl.sh: #943: TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 254, expected is 0 - FAILED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:15 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:tls1.0   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12229:
SSL peer was not expecting a handshake message it received.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: write to SSL socket failed: SSL received an unexpected Server Hello Done handshake message.
tstclnt: exiting with return code 254
ssl.sh: #944: TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 254, expected is 0 - FAILED
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:15 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.0   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #945: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:15 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.0   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #946: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:16 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.0   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #947: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:16 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.0   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #948: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:16 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #949: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:16 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #950: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:16 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #951: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:17 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #952: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:17 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #953: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:17 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #954: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:17 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12229:
SSL peer was not expecting a handshake message it received.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: write to SSL socket failed: SSL received an unexpected Server Hello Done handshake message.
tstclnt: exiting with return code 254
ssl.sh: #955: TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 254, expected is 0 - FAILED
ssl.sh: running TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:18 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12229:
SSL peer was not expecting a handshake message it received.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: write to SSL socket failed: SSL received an unexpected Server Hello Done handshake message.
tstclnt: exiting with return code 254
ssl.sh: #956: TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 254, expected is 0 - FAILED
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:18 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #957: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:18 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #958: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:18 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #959: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 1136 >/dev/null 2>/dev/null
selfserv with PID 1136 found at Mon Jun  6 22:47:18 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #960: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only)
trying to kill selfserv with PID 1136 at Mon Jun  6 22:47:20 UTC 2016
kill -USR1 1136
selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1136 killed at Mon Jun  6 22:47:20 UTC 2016
ssl.sh: SSL Client Authentication  - server bypass/client normal  ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:47:20 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:47:20 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 2854 >/dev/null 2>/dev/null
selfserv with PID 2854 found at Mon Jun  6 22:47:20 UTC 2016
selfserv with PID 2854 started at Mon Jun  6 22:47:20 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #961: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2854 at Mon Jun  6 22:47:21 UTC 2016
kill -USR1 2854
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2854 killed at Mon Jun  6 22:47:21 UTC 2016
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Mon Jun  6 22:47:21 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:47:21 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 2911 >/dev/null 2>/dev/null
selfserv with PID 2911 found at Mon Jun  6 22:47:21 UTC 2016
selfserv with PID 2911 started at Mon Jun  6 22:47:21 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -w bogus -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #962: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2911 at Mon Jun  6 22:47:22 UTC 2016
kill -USR1 2911
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2911 killed at Mon Jun  6 22:47:22 UTC 2016
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Mon Jun  6 22:47:22 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:47:22 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 2968 >/dev/null 2>/dev/null
selfserv with PID 2968 found at Mon Jun  6 22:47:22 UTC 2016
selfserv with PID 2968 started at Mon Jun  6 22:47:22 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -w nss -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #963: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2968 at Mon Jun  6 22:47:23 UTC 2016
kill -USR1 2968
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2968 killed at Mon Jun  6 22:47:23 UTC 2016
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:47:23 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:47:23 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 3025 >/dev/null 2>/dev/null
selfserv with PID 3025 found at Mon Jun  6 22:47:23 UTC 2016
selfserv with PID 3025 started at Mon Jun  6 22:47:23 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #964: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3025 at Mon Jun  6 22:47:23 UTC 2016
kill -USR1 3025
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3025 killed at Mon Jun  6 22:47:23 UTC 2016
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Mon Jun  6 22:47:24 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:47:24 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 3082 >/dev/null 2>/dev/null
selfserv with PID 3082 found at Mon Jun  6 22:47:24 UTC 2016
selfserv with PID 3082 started at Mon Jun  6 22:47:24 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -w bogus -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #965: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3082 at Mon Jun  6 22:47:24 UTC 2016
kill -USR1 3082
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3082 killed at Mon Jun  6 22:47:24 UTC 2016
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Mon Jun  6 22:47:24 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:47:24 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 3139 >/dev/null 2>/dev/null
selfserv with PID 3139 found at Mon Jun  6 22:47:24 UTC 2016
selfserv with PID 3139 started at Mon Jun  6 22:47:24 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -w nss -n TestUser   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #966: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3139 at Mon Jun  6 22:47:25 UTC 2016
kill -USR1 3139
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3139 killed at Mon Jun  6 22:47:25 UTC 2016
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:47:25 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:47:25 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 3196 >/dev/null 2>/dev/null
selfserv with PID 3196 found at Mon Jun  6 22:47:25 UTC 2016
selfserv with PID 3196 started at Mon Jun  6 22:47:25 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V :ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #967: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3196 at Mon Jun  6 22:47:26 UTC 2016
kill -USR1 3196
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3196 killed at Mon Jun  6 22:47:26 UTC 2016
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Mon Jun  6 22:47:26 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:47:26 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 3253 >/dev/null 2>/dev/null
selfserv with PID 3253 found at Mon Jun  6 22:47:26 UTC 2016
selfserv with PID 3253 started at Mon Jun  6 22:47:26 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V :ssl3 -n TestUser -w bogus  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #968: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3253 at Mon Jun  6 22:47:27 UTC 2016
kill -USR1 3253
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3253 killed at Mon Jun  6 22:47:27 UTC 2016
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Mon Jun  6 22:47:27 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:47:27 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 3310 >/dev/null 2>/dev/null
selfserv with PID 3310 found at Mon Jun  6 22:47:27 UTC 2016
selfserv with PID 3310 started at Mon Jun  6 22:47:27 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V :ssl3 -n TestUser -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #969: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3310 at Mon Jun  6 22:47:27 UTC 2016
kill -USR1 3310
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3310 killed at Mon Jun  6 22:47:27 UTC 2016
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:47:28 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:47:28 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 3367 >/dev/null 2>/dev/null
selfserv with PID 3367 found at Mon Jun  6 22:47:28 UTC 2016
selfserv with PID 3367 started at Mon Jun  6 22:47:28 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V :ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #970: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3367 at Mon Jun  6 22:47:28 UTC 2016
kill -USR1 3367
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3367 killed at Mon Jun  6 22:47:28 UTC 2016
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Mon Jun  6 22:47:28 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:47:28 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 3424 >/dev/null 2>/dev/null
selfserv with PID 3424 found at Mon Jun  6 22:47:28 UTC 2016
selfserv with PID 3424 started at Mon Jun  6 22:47:28 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V :ssl3 -n TestUser -w bogus  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #971: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3424 at Mon Jun  6 22:47:29 UTC 2016
kill -USR1 3424
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3424 killed at Mon Jun  6 22:47:29 UTC 2016
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Mon Jun  6 22:47:29 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:47:29 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 3481 >/dev/null 2>/dev/null
selfserv with PID 3481 found at Mon Jun  6 22:47:29 UTC 2016
selfserv with PID 3481 started at Mon Jun  6 22:47:29 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V :ssl3 -n TestUser -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #972: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3481 at Mon Jun  6 22:47:30 UTC 2016
kill -USR1 3481
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3481 killed at Mon Jun  6 22:47:30 UTC 2016
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:47:30 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:47:30 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 3538 >/dev/null 2>/dev/null
selfserv with PID 3538 found at Mon Jun  6 22:47:30 UTC 2016
selfserv with PID 3538 started at Mon Jun  6 22:47:30 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3: -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #973: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3538 at Mon Jun  6 22:47:31 UTC 2016
kill -USR1 3538
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3538 killed at Mon Jun  6 22:47:31 UTC 2016
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:47:31 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:47:31 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 3595 >/dev/null 2>/dev/null
selfserv with PID 3595 found at Mon Jun  6 22:47:31 UTC 2016
selfserv with PID 3595 started at Mon Jun  6 22:47:31 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3: -w bogus -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #974: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3595 at Mon Jun  6 22:47:32 UTC 2016
kill -USR1 3595
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3595 killed at Mon Jun  6 22:47:32 UTC 2016
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:47:32 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:47:32 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 3652 >/dev/null 2>/dev/null
selfserv with PID 3652 found at Mon Jun  6 22:47:32 UTC 2016
selfserv with PID 3652 started at Mon Jun  6 22:47:32 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #975: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3652 at Mon Jun  6 22:47:32 UTC 2016
kill -USR1 3652
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3652 killed at Mon Jun  6 22:47:32 UTC 2016
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:47:33 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:47:33 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 3709 >/dev/null 2>/dev/null
selfserv with PID 3709 found at Mon Jun  6 22:47:33 UTC 2016
selfserv with PID 3709 started at Mon Jun  6 22:47:33 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3: -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #976: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3709 at Mon Jun  6 22:47:33 UTC 2016
kill -USR1 3709
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3709 killed at Mon Jun  6 22:47:33 UTC 2016
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:47:33 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:47:33 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 3766 >/dev/null 2>/dev/null
selfserv with PID 3766 found at Mon Jun  6 22:47:34 UTC 2016
selfserv with PID 3766 started at Mon Jun  6 22:47:34 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3: -w bogus -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #977: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3766 at Mon Jun  6 22:47:34 UTC 2016
kill -USR1 3766
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3766 killed at Mon Jun  6 22:47:34 UTC 2016
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:47:34 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:47:34 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 3831 >/dev/null 2>/dev/null
selfserv with PID 3831 found at Mon Jun  6 22:47:34 UTC 2016
selfserv with PID 3831 started at Mon Jun  6 22:47:34 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #978: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3831 at Mon Jun  6 22:47:35 UTC 2016
kill -USR1 3831
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3831 killed at Mon Jun  6 22:47:35 UTC 2016
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:47:35 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:47:35 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 3955 >/dev/null 2>/dev/null
selfserv with PID 3955 found at Mon Jun  6 22:47:35 UTC 2016
selfserv with PID 3955 started at Mon Jun  6 22:47:35 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #979: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3955 at Mon Jun  6 22:47:36 UTC 2016
kill -USR1 3955
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3955 killed at Mon Jun  6 22:47:36 UTC 2016
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:47:36 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:47:36 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 4012 >/dev/null 2>/dev/null
selfserv with PID 4012 found at Mon Jun  6 22:47:36 UTC 2016
selfserv with PID 4012 started at Mon Jun  6 22:47:36 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #980: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4012 at Mon Jun  6 22:47:37 UTC 2016
kill -USR1 4012
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4012 killed at Mon Jun  6 22:47:37 UTC 2016
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:47:37 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:47:37 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 4069 >/dev/null 2>/dev/null
selfserv with PID 4069 found at Mon Jun  6 22:47:37 UTC 2016
selfserv with PID 4069 started at Mon Jun  6 22:47:37 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #981: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4069 at Mon Jun  6 22:47:37 UTC 2016
kill -USR1 4069
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4069 killed at Mon Jun  6 22:47:37 UTC 2016
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:47:38 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:47:38 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 4126 >/dev/null 2>/dev/null
selfserv with PID 4126 found at Mon Jun  6 22:47:38 UTC 2016
selfserv with PID 4126 started at Mon Jun  6 22:47:38 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #982: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4126 at Mon Jun  6 22:47:38 UTC 2016
kill -USR1 4126
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4126 killed at Mon Jun  6 22:47:38 UTC 2016
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:47:38 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:47:38 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 4183 >/dev/null 2>/dev/null
selfserv with PID 4183 found at Mon Jun  6 22:47:38 UTC 2016
selfserv with PID 4183 started at Mon Jun  6 22:47:38 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #983: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4183 at Mon Jun  6 22:47:39 UTC 2016
kill -USR1 4183
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4183 killed at Mon Jun  6 22:47:39 UTC 2016
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:47:39 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:47:39 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 4240 >/dev/null 2>/dev/null
selfserv with PID 4240 found at Mon Jun  6 22:47:39 UTC 2016
selfserv with PID 4240 started at Mon Jun  6 22:47:39 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #984: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4240 at Mon Jun  6 22:47:40 UTC 2016
kill -USR1 4240
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4240 killed at Mon Jun  6 22:47:40 UTC 2016
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:47:40 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:47:40 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 4297 >/dev/null 2>/dev/null
selfserv with PID 4297 found at Mon Jun  6 22:47:40 UTC 2016
selfserv with PID 4297 started at Mon Jun  6 22:47:40 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #985: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4297 at Mon Jun  6 22:47:41 UTC 2016
kill -USR1 4297
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4297 killed at Mon Jun  6 22:47:41 UTC 2016
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:47:41 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:47:41 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 4354 >/dev/null 2>/dev/null
selfserv with PID 4354 found at Mon Jun  6 22:47:41 UTC 2016
selfserv with PID 4354 started at Mon Jun  6 22:47:41 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w bogus  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #986: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4354 at Mon Jun  6 22:47:42 UTC 2016
kill -USR1 4354
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4354 killed at Mon Jun  6 22:47:42 UTC 2016
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:47:42 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:47:42 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 4411 >/dev/null 2>/dev/null
selfserv with PID 4411 found at Mon Jun  6 22:47:42 UTC 2016
selfserv with PID 4411 started at Mon Jun  6 22:47:42 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #987: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4411 at Mon Jun  6 22:47:43 UTC 2016
kill -USR1 4411
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4411 killed at Mon Jun  6 22:47:43 UTC 2016
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:47:43 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:47:43 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 4468 >/dev/null 2>/dev/null
selfserv with PID 4468 found at Mon Jun  6 22:47:43 UTC 2016
selfserv with PID 4468 started at Mon Jun  6 22:47:43 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #988: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4468 at Mon Jun  6 22:47:43 UTC 2016
kill -USR1 4468
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4468 killed at Mon Jun  6 22:47:43 UTC 2016
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:47:44 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:47:44 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 4525 >/dev/null 2>/dev/null
selfserv with PID 4525 found at Mon Jun  6 22:47:44 UTC 2016
selfserv with PID 4525 started at Mon Jun  6 22:47:44 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w bogus  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #989: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4525 at Mon Jun  6 22:47:44 UTC 2016
kill -USR1 4525
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4525 killed at Mon Jun  6 22:47:44 UTC 2016
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:47:44 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:47:44 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 4582 >/dev/null 2>/dev/null
selfserv with PID 4582 found at Mon Jun  6 22:47:44 UTC 2016
selfserv with PID 4582 started at Mon Jun  6 22:47:44 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #990: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4582 at Mon Jun  6 22:47:45 UTC 2016
kill -USR1 4582
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4582 killed at Mon Jun  6 22:47:45 UTC 2016
ssl.sh: skipping  TLS Request don't require client auth (EC) (bad password) (ECC only)
ssl.sh: skipping  TLS Request don't require client auth (EC) (client auth) (ECC only)
ssl.sh: skipping  TLS Require client auth (EC) (bad password) (ECC only)
ssl.sh: skipping  TLS Require client auth (EC) (client auth) (ECC only)
ssl.sh: skipping  SSL3 Request don't require client auth (EC) (bad password) (ECC only)
ssl.sh: skipping  SSL3 Request don't require client auth (EC) (client auth) (ECC only)
ssl.sh: skipping  SSL3 Require client auth (EC) (bad password) (ECC only)
ssl.sh: skipping  SSL3 Require client auth (EC) (client auth) (ECC only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping  TLS Require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping  TLS Require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping  TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping  TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping  SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping  SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Mon Jun  6 22:47:46 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:47:46 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 4715 >/dev/null 2>/dev/null
selfserv with PID 4715 found at Mon Jun  6 22:47:46 UTC 2016
selfserv with PID 4715 started at Mon Jun  6 22:47:46 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #991: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4715 at Mon Jun  6 22:47:47 UTC 2016
kill -USR1 4715
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4715 killed at Mon Jun  6 22:47:47 UTC 2016
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Mon Jun  6 22:47:47 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:47:47 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 4778 >/dev/null 2>/dev/null
selfserv with PID 4778 found at Mon Jun  6 22:47:47 UTC 2016
selfserv with PID 4778 started at Mon Jun  6 22:47:47 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a testbuildd-sni.(none)  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=testbuildd-sni.(none),E=testbuildd-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #992: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4778 at Mon Jun  6 22:47:47 UTC 2016
kill -USR1 4778
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4778 killed at Mon Jun  6 22:47:47 UTC 2016
ssl.sh: TLS Server response with alert ----
selfserv starting at Mon Jun  6 22:47:48 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:47:48 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 4841 >/dev/null 2>/dev/null
selfserv with PID 4841 found at Mon Jun  6 22:47:48 UTC 2016
selfserv with PID 4841 started at Mon Jun  6 22:47:48 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a testbuildd-sni1.(none)  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #993: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4841 at Mon Jun  6 22:47:48 UTC 2016
kill -USR1 4841
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4841 killed at Mon Jun  6 22:47:48 UTC 2016
ssl.sh: SSL3 Server hello response without SNI ----
selfserv starting at Mon Jun  6 22:47:48 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:47:48 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 4904 >/dev/null 2>/dev/null
selfserv with PID 4904 found at Mon Jun  6 22:47:49 UTC 2016
selfserv with PID 4904 started at Mon Jun  6 22:47:49 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #994: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4904 at Mon Jun  6 22:47:49 UTC 2016
kill -USR1 4904
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4904 killed at Mon Jun  6 22:47:49 UTC 2016
ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ----
selfserv starting at Mon Jun  6 22:47:49 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:47:49 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 4967 >/dev/null 2>/dev/null
selfserv with PID 4967 found at Mon Jun  6 22:47:49 UTC 2016
selfserv with PID 4967 started at Mon Jun  6 22:47:49 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n TestUser -a testbuildd-sni.(none)  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: authentication of server cert failed: Unable to communicate securely with peer: requested domain name does not match the server's certificate.
tstclnt: exiting with return code 254
ssl.sh: #995: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4967 at Mon Jun  6 22:47:50 UTC 2016
kill -USR1 4967
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4967 killed at Mon Jun  6 22:47:50 UTC 2016
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Mon Jun  6 22:47:50 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -r -r -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:47:50 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 5030 >/dev/null 2>/dev/null
selfserv with PID 5030 found at Mon Jun  6 22:47:50 UTC 2016
selfserv with PID 5030 started at Mon Jun  6 22:47:50 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #996: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5030 at Mon Jun  6 22:47:51 UTC 2016
kill -USR1 5030
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5030 killed at Mon Jun  6 22:47:51 UTC 2016
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Mon Jun  6 22:47:51 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -r -r -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:47:51 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 5093 >/dev/null 2>/dev/null
selfserv with PID 5093 found at Mon Jun  6 22:47:51 UTC 2016
selfserv with PID 5093 started at Mon Jun  6 22:47:51 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a testbuildd-sni.(none)  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=testbuildd-sni.(none),E=testbuildd-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=testbuildd-sni.(none),E=testbuildd-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #997: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5093 at Mon Jun  6 22:47:52 UTC 2016
kill -USR1 5093
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5093 killed at Mon Jun  6 22:47:52 UTC 2016
ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ----
selfserv starting at Mon Jun  6 22:47:52 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -r -r -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:47:52 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 5156 >/dev/null 2>/dev/null
selfserv with PID 5156 found at Mon Jun  6 22:47:52 UTC 2016
selfserv with PID 5156 started at Mon Jun  6 22:47:52 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a testbuildd-sni.(none) -a testbuildd.(none)  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=testbuildd-sni.(none),E=testbuildd-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 1
ssl.sh: #998: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5156 at Mon Jun  6 22:47:53 UTC 2016
kill -USR1 5156
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5156 killed at Mon Jun  6 22:47:53 UTC 2016
ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ----
selfserv starting at Mon Jun  6 22:47:53 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -r -r -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:47:53 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 5219 >/dev/null 2>/dev/null
selfserv with PID 5219 found at Mon Jun  6 22:47:53 UTC 2016
selfserv with PID 5219 started at Mon Jun  6 22:47:53 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a testbuildd-sni.(none) -a testbuildd-sni1.(none)  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=testbuildd-sni.(none),E=testbuildd-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 1
ssl.sh: #999: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5219 at Mon Jun  6 22:47:53 UTC 2016
kill -USR1 5219
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5219 killed at Mon Jun  6 22:47:54 UTC 2016
ssl.sh: TLS Server response with alert ----
selfserv starting at Mon Jun  6 22:47:54 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -r -r -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:47:54 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 5282 >/dev/null 2>/dev/null
selfserv with PID 5282 found at Mon Jun  6 22:47:54 UTC 2016
selfserv with PID 5282 started at Mon Jun  6 22:47:54 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a testbuildd-sni1.(none)  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #1000: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5282 at Mon Jun  6 22:47:54 UTC 2016
kill -USR1 5282
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5282 killed at Mon Jun  6 22:47:54 UTC 2016
ssl.sh: SSL Stress Test  - server bypass/client normal  ===============================
ssl.sh: Stress SSL2 RC4 128 with MD5 ----
selfserv starting at Mon Jun  6 22:47:55 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss   -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:47:55 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 5414 >/dev/null 2>/dev/null
selfserv with PID 5414 found at Mon Jun  6 22:47:55 UTC 2016
selfserv with PID 5414 started at Mon Jun  6 22:47:55 UTC 2016
strsclnt -q -p 8443 -d ../client  -w nss -c 1000 -C A \
          127.0.0.1
strsclnt started at Mon Jun  6 22:47:55 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: SSL2 - 1 server certificates tested.
strsclnt completed at Mon Jun  6 22:47:56 UTC 2016
ssl.sh: #1001: Stress SSL2 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5414 at Mon Jun  6 22:47:56 UTC 2016
kill -USR1 5414
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5414 killed at Mon Jun  6 22:47:56 UTC 2016
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Mon Jun  6 22:47:57 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss   -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:47:57 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 5490 >/dev/null 2>/dev/null
selfserv with PID 5490 found at Mon Jun  6 22:47:57 UTC 2016
selfserv with PID 5490 started at Mon Jun  6 22:47:57 UTC 2016
strsclnt -q -p 8443 -d ../client  -w nss -c 1000 -C c -V :ssl3 \
          127.0.0.1
strsclnt started at Mon Jun  6 22:47:57 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Mon Jun  6 22:47:58 UTC 2016
ssl.sh: #1002: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5490 at Mon Jun  6 22:47:58 UTC 2016
kill -USR1 5490
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5490 killed at Mon Jun  6 22:47:58 UTC 2016
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Mon Jun  6 22:47:58 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss   -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:47:58 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 5566 >/dev/null 2>/dev/null
selfserv with PID 5566 found at Mon Jun  6 22:47:58 UTC 2016
selfserv with PID 5566 started at Mon Jun  6 22:47:58 UTC 2016
strsclnt -q -p 8443 -d ../client  -w nss -c 1000 -C c \
          127.0.0.1
strsclnt started at Mon Jun  6 22:47:58 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Mon Jun  6 22:48:00 UTC 2016
ssl.sh: #1003: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5566 at Mon Jun  6 22:48:00 UTC 2016
kill -USR1 5566
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5566 killed at Mon Jun  6 22:48:00 UTC 2016
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Mon Jun  6 22:48:00 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss   -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:48:00 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 5642 >/dev/null 2>/dev/null
selfserv with PID 5642 found at Mon Jun  6 22:48:00 UTC 2016
selfserv with PID 5642 started at Mon Jun  6 22:48:00 UTC 2016
strsclnt -q -p 8443 -d ../client  -w nss -c 1000 -C c -g \
          127.0.0.1
strsclnt started at Mon Jun  6 22:48:00 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Mon Jun  6 22:48:02 UTC 2016
ssl.sh: #1004: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5642 at Mon Jun  6 22:48:02 UTC 2016
kill -USR1 5642
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5642 killed at Mon Jun  6 22:48:02 UTC 2016
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Mon Jun  6 22:48:02 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -u -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:48:02 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 5718 >/dev/null 2>/dev/null
selfserv with PID 5718 found at Mon Jun  6 22:48:02 UTC 2016
selfserv with PID 5718 started at Mon Jun  6 22:48:02 UTC 2016
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3: -c 1000 -C c -u \
          127.0.0.1
strsclnt started at Mon Jun  6 22:48:02 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Mon Jun  6 22:48:04 UTC 2016
ssl.sh: #1005: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5718 at Mon Jun  6 22:48:04 UTC 2016
kill -USR1 5718
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5718 killed at Mon Jun  6 22:48:04 UTC 2016
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Mon Jun  6 22:48:04 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:48:04 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 5794 >/dev/null 2>/dev/null
selfserv with PID 5794 found at Mon Jun  6 22:48:04 UTC 2016
selfserv with PID 5794 started at Mon Jun  6 22:48:04 UTC 2016
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3: -c 1000 -C c -z \
          127.0.0.1
strsclnt started at Mon Jun  6 22:48:04 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Mon Jun  6 22:48:06 UTC 2016
ssl.sh: #1006: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5794 at Mon Jun  6 22:48:06 UTC 2016
kill -USR1 5794
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5794 killed at Mon Jun  6 22:48:06 UTC 2016
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Mon Jun  6 22:48:06 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -u -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:48:06 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 5870 >/dev/null 2>/dev/null
selfserv with PID 5870 found at Mon Jun  6 22:48:06 UTC 2016
selfserv with PID 5870 started at Mon Jun  6 22:48:07 UTC 2016
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3: -c 1000 -C c -u -z \
          127.0.0.1
strsclnt started at Mon Jun  6 22:48:07 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Mon Jun  6 22:48:08 UTC 2016
ssl.sh: #1007: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5870 at Mon Jun  6 22:48:09 UTC 2016
kill -USR1 5870
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5870 killed at Mon Jun  6 22:48:09 UTC 2016
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Mon Jun  6 22:48:09 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -u -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:48:09 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 5946 >/dev/null 2>/dev/null
selfserv with PID 5946 found at Mon Jun  6 22:48:09 UTC 2016
selfserv with PID 5946 started at Mon Jun  6 22:48:09 UTC 2016
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3: -c 1000 -C c -u -z -g \
          127.0.0.1
strsclnt started at Mon Jun  6 22:48:09 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Mon Jun  6 22:48:11 UTC 2016
ssl.sh: #1008: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5946 at Mon Jun  6 22:48:11 UTC 2016
kill -USR1 5946
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5946 killed at Mon Jun  6 22:48:11 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ----
selfserv starting at Mon Jun  6 22:48:11 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -u -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:48:11 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 6028 >/dev/null 2>/dev/null
selfserv with PID 6028 found at Mon Jun  6 22:48:11 UTC 2016
selfserv with PID 6028 started at Mon Jun  6 22:48:11 UTC 2016
strsclnt -q -p 8443 -d ../client  -w nss -V tls1.0: -c 1000 -C c -u \
          127.0.0.1
strsclnt started at Mon Jun  6 22:48:11 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Mon Jun  6 22:48:13 UTC 2016
ssl.sh: #1009: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6028 at Mon Jun  6 22:48:13 UTC 2016
kill -USR1 6028
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6028 killed at Mon Jun  6 22:48:13 UTC 2016
ssl.sh: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Mon Jun  6 22:48:13 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:48:13 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 6125 >/dev/null 2>/dev/null
selfserv with PID 6125 found at Mon Jun  6 22:48:13 UTC 2016
selfserv with PID 6125 started at Mon Jun  6 22:48:13 UTC 2016
strsclnt -q -p 8443 -d ../client  -w nss -c 100 -C A -N -n TestUser \
          127.0.0.1
strsclnt started at Mon Jun  6 22:48:13 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: SSL2 - 100 server certificates tested.
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Mon Jun  6 22:48:15 UTC 2016
ssl.sh: #1010: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6125 at Mon Jun  6 22:48:15 UTC 2016
kill -USR1 6125
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6125 killed at Mon Jun  6 22:48:15 UTC 2016
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Mon Jun  6 22:48:15 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:48:15 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 6200 >/dev/null 2>/dev/null
selfserv with PID 6200 found at Mon Jun  6 22:48:15 UTC 2016
selfserv with PID 6200 started at Mon Jun  6 22:48:15 UTC 2016
strsclnt -q -p 8443 -d ../client  -w nss -c 100 -C c -V :ssl3 -N -n TestUser \
          127.0.0.1
strsclnt started at Mon Jun  6 22:48:15 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Mon Jun  6 22:48:17 UTC 2016
ssl.sh: #1011: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6200 at Mon Jun  6 22:48:17 UTC 2016
kill -USR1 6200
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6200 killed at Mon Jun  6 22:48:17 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Mon Jun  6 22:48:17 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:48:17 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 6275 >/dev/null 2>/dev/null
selfserv with PID 6275 found at Mon Jun  6 22:48:17 UTC 2016
selfserv with PID 6275 started at Mon Jun  6 22:48:17 UTC 2016
strsclnt -q -p 8443 -d ../client  -w nss -c 100 -C c -N -n TestUser \
          127.0.0.1
strsclnt started at Mon Jun  6 22:48:17 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Mon Jun  6 22:48:18 UTC 2016
ssl.sh: #1012: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6275 at Mon Jun  6 22:48:19 UTC 2016
kill -USR1 6275
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6275 killed at Mon Jun  6 22:48:19 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Mon Jun  6 22:48:19 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -r -u -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:48:19 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 6350 >/dev/null 2>/dev/null
selfserv with PID 6350 found at Mon Jun  6 22:48:19 UTC 2016
selfserv with PID 6350 started at Mon Jun  6 22:48:19 UTC 2016
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -u \
          127.0.0.1
strsclnt started at Mon Jun  6 22:48:19 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Mon Jun  6 22:48:19 UTC 2016
ssl.sh: #1013: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6350 at Mon Jun  6 22:48:20 UTC 2016
kill -USR1 6350
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6350 killed at Mon Jun  6 22:48:20 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Mon Jun  6 22:48:20 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -r -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:48:20 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 6426 >/dev/null 2>/dev/null
selfserv with PID 6426 found at Mon Jun  6 22:48:20 UTC 2016
selfserv with PID 6426 started at Mon Jun  6 22:48:20 UTC 2016
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -z \
          127.0.0.1
strsclnt started at Mon Jun  6 22:48:20 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Mon Jun  6 22:48:21 UTC 2016
ssl.sh: #1014: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6426 at Mon Jun  6 22:48:21 UTC 2016
kill -USR1 6426
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6426 killed at Mon Jun  6 22:48:21 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Mon Jun  6 22:48:21 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -r -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:48:21 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 6502 >/dev/null 2>/dev/null
selfserv with PID 6502 found at Mon Jun  6 22:48:21 UTC 2016
selfserv with PID 6502 started at Mon Jun  6 22:48:21 UTC 2016
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \
          127.0.0.1
strsclnt started at Mon Jun  6 22:48:21 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Mon Jun  6 22:48:22 UTC 2016
ssl.sh: #1015: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6502 at Mon Jun  6 22:48:22 UTC 2016
kill -USR1 6502
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6502 killed at Mon Jun  6 22:48:22 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Mon Jun  6 22:48:22 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -r -u -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:48:22 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 6578 >/dev/null 2>/dev/null
selfserv with PID 6578 found at Mon Jun  6 22:48:22 UTC 2016
selfserv with PID 6578 started at Mon Jun  6 22:48:22 UTC 2016
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \
          127.0.0.1
strsclnt started at Mon Jun  6 22:48:22 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Mon Jun  6 22:48:23 UTC 2016
ssl.sh: #1016: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6578 at Mon Jun  6 22:48:23 UTC 2016
kill -USR1 6578
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6578 killed at Mon Jun  6 22:48:23 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Mon Jun  6 22:48:23 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -r -u -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:48:23 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 6654 >/dev/null 2>/dev/null
selfserv with PID 6654 found at Mon Jun  6 22:48:23 UTC 2016
selfserv with PID 6654 started at Mon Jun  6 22:48:23 UTC 2016
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \
          127.0.0.1
strsclnt started at Mon Jun  6 22:48:23 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Mon Jun  6 22:48:24 UTC 2016
ssl.sh: #1017: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6654 at Mon Jun  6 22:48:24 UTC 2016
kill -USR1 6654
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6654 killed at Mon Jun  6 22:48:24 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ----
selfserv starting at Mon Jun  6 22:48:24 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -r -u -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:48:24 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 6736 >/dev/null 2>/dev/null
selfserv with PID 6736 found at Mon Jun  6 22:48:24 UTC 2016
selfserv with PID 6736 started at Mon Jun  6 22:48:24 UTC 2016
strsclnt -q -p 8443 -d ../client  -w nss -V tls1.0: -c 1000 -C c -u \
          127.0.0.1
strsclnt started at Mon Jun  6 22:48:24 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Mon Jun  6 22:48:26 UTC 2016
ssl.sh: #1018: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6736 at Mon Jun  6 22:48:26 UTC 2016
kill -USR1 6736
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6736 killed at Mon Jun  6 22:48:26 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ----
selfserv starting at Mon Jun  6 22:48:26 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
          -w nss -r -r -u -a testbuildd-sni.(none) -k testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:48:26 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 6818 >/dev/null 2>/dev/null
selfserv with PID 6818 found at Mon Jun  6 22:48:26 UTC 2016
selfserv with PID 6818 started at Mon Jun  6 22:48:26 UTC 2016
strsclnt -q -p 8443 -d ../client  -w nss -V tls1.0: -c 1000 -C c -u -a testbuildd-sni.(none) \
          127.0.0.1
strsclnt started at Mon Jun  6 22:48:26 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Mon Jun  6 22:48:28 UTC 2016
ssl.sh: #1019: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6818 at Mon Jun  6 22:48:28 UTC 2016
kill -USR1 6818
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6818 killed at Mon Jun  6 22:48:28 UTC 2016
ssl.sh: skipping  Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only)
ssl.sh: skipping  Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA (ECC only)
ssl.sh: skipping  Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) (ECC only)
ssl.sh: skipping  Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) (ECC only)
ssl.sh: skipping  Stress TLS  ECDHE-RSA   AES 128 CBC with SHA (ECC only)
ssl.sh: skipping  Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) (ECC only)
ssl.sh: skipping  Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only)
ssl.sh: skipping  Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only)
ssl.sh: skipping  Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only)
ssl.sh: skipping  Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only)
ssl.sh: skipping  Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only)
ssl.sh: skipping  Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only)
ssl.sh: SSL Cipher Coverage Extended Test - server bypass/client normal  ===============================
selfserv starting at Mon Jun  6 22:48:29 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
          -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:48:29 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 6971 >/dev/null 2>/dev/null
selfserv with PID 6971 found at Mon Jun  6 22:48:29 UTC 2016
selfserv with PID 6971 started at Mon Jun  6 22:48:29 UTC 2016
ssl.sh: skipping  SSL2_RC4_128_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 for Extended Test
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 6971 >/dev/null 2>/dev/null
selfserv with PID 6971 found at Mon Jun  6 22:48:30 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1020: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 6971 >/dev/null 2>/dev/null
selfserv with PID 6971 found at Mon Jun  6 22:48:30 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1021: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 6971 >/dev/null 2>/dev/null
selfserv with PID 6971 found at Mon Jun  6 22:48:30 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1022: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 6971 >/dev/null 2>/dev/null
selfserv with PID 6971 found at Mon Jun  6 22:48:30 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c f -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1023: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 6971 >/dev/null 2>/dev/null
selfserv with PID 6971 found at Mon Jun  6 22:48:30 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c g -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1024: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 6971 >/dev/null 2>/dev/null
selfserv with PID 6971 found at Mon Jun  6 22:48:31 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1025: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 6971 >/dev/null 2>/dev/null
selfserv with PID 6971 found at Mon Jun  6 22:48:31 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1026: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 6971 >/dev/null 2>/dev/null
selfserv with PID 6971 found at Mon Jun  6 22:48:31 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1027: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 6971 >/dev/null 2>/dev/null
selfserv with PID 6971 found at Mon Jun  6 22:48:31 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12229:
SSL peer was not expecting a handshake message it received.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: write to SSL socket failed: SSL received an unexpected Server Hello Done handshake message.
tstclnt: exiting with return code 254
ssl.sh: #1028: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 254, expected is 0 - FAILED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 6971 >/dev/null 2>/dev/null
selfserv with PID 6971 found at Mon Jun  6 22:48:31 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12229:
SSL peer was not expecting a handshake message it received.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: write to SSL socket failed: SSL received an unexpected Server Hello Done handshake message.
tstclnt: exiting with return code 254
ssl.sh: #1029: SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 254, expected is 0 - FAILED
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 6971 >/dev/null 2>/dev/null
selfserv with PID 6971 found at Mon Jun  6 22:48:32 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1030: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 6971 >/dev/null 2>/dev/null
selfserv with PID 6971 found at Mon Jun  6 22:48:32 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1031: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 6971 >/dev/null 2>/dev/null
selfserv with PID 6971 found at Mon Jun  6 22:48:32 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1032: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 6971 >/dev/null 2>/dev/null
selfserv with PID 6971 found at Mon Jun  6 22:48:32 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1033: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 6971 >/dev/null 2>/dev/null
selfserv with PID 6971 found at Mon Jun  6 22:48:32 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.0   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1034: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 6971 >/dev/null 2>/dev/null
selfserv with PID 6971 found at Mon Jun  6 22:48:33 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.0   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1035: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 6971 >/dev/null 2>/dev/null
selfserv with PID 6971 found at Mon Jun  6 22:48:33 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.0   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1036: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 6971 >/dev/null 2>/dev/null
selfserv with PID 6971 found at Mon Jun  6 22:48:33 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c f -V ssl3:tls1.0   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1037: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 6971 >/dev/null 2>/dev/null
selfserv with PID 6971 found at Mon Jun  6 22:48:33 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c g -V ssl3:tls1.0   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1038: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 6971 >/dev/null 2>/dev/null
selfserv with PID 6971 found at Mon Jun  6 22:48:33 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.0   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1039: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 6971 >/dev/null 2>/dev/null
selfserv with PID 6971 found at Mon Jun  6 22:48:34 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.0   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1040: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 6971 >/dev/null 2>/dev/null
selfserv with PID 6971 found at Mon Jun  6 22:48:34 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.0   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1041: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 6971 >/dev/null 2>/dev/null
selfserv with PID 6971 found at Mon Jun  6 22:48:34 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:tls1.0   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12229:
SSL peer was not expecting a handshake message it received.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: write to SSL socket failed: SSL received an unexpected Server Hello Done handshake message.
tstclnt: exiting with return code 254
ssl.sh: #1042: TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 254, expected is 0 - FAILED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 6971 >/dev/null 2>/dev/null
selfserv with PID 6971 found at Mon Jun  6 22:48:34 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:tls1.0   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12229:
SSL peer was not expecting a handshake message it received.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: write to SSL socket failed: SSL received an unexpected Server Hello Done handshake message.
tstclnt: exiting with return code 254
ssl.sh: #1043: TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 254, expected is 0 - FAILED
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 6971 >/dev/null 2>/dev/null
selfserv with PID 6971 found at Mon Jun  6 22:48:34 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.0   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1044: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 6971 >/dev/null 2>/dev/null
selfserv with PID 6971 found at Mon Jun  6 22:48:35 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.0   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1045: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 6971 >/dev/null 2>/dev/null
selfserv with PID 6971 found at Mon Jun  6 22:48:35 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.0   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1046: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 6971 >/dev/null 2>/dev/null
selfserv with PID 6971 found at Mon Jun  6 22:48:35 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.0   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1047: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 6971 >/dev/null 2>/dev/null
selfserv with PID 6971 found at Mon Jun  6 22:48:35 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1048: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 6971 >/dev/null 2>/dev/null
selfserv with PID 6971 found at Mon Jun  6 22:48:35 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1049: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 6971 >/dev/null 2>/dev/null
selfserv with PID 6971 found at Mon Jun  6 22:48:36 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1050: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 6971 >/dev/null 2>/dev/null
selfserv with PID 6971 found at Mon Jun  6 22:48:36 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1051: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 6971 >/dev/null 2>/dev/null
selfserv with PID 6971 found at Mon Jun  6 22:48:36 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1052: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 6971 >/dev/null 2>/dev/null
selfserv with PID 6971 found at Mon Jun  6 22:48:36 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1053: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 6971 >/dev/null 2>/dev/null
selfserv with PID 6971 found at Mon Jun  6 22:48:37 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12229:
SSL peer was not expecting a handshake message it received.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: write to SSL socket failed: SSL received an unexpected Server Hello Done handshake message.
tstclnt: exiting with return code 254
ssl.sh: #1054: TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 254, expected is 0 - FAILED
ssl.sh: running TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 6971 >/dev/null 2>/dev/null
selfserv with PID 6971 found at Mon Jun  6 22:48:37 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12229:
SSL peer was not expecting a handshake message it received.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: write to SSL socket failed: SSL received an unexpected Server Hello Done handshake message.
tstclnt: exiting with return code 254
ssl.sh: #1055: TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 254, expected is 0 - FAILED
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 6971 >/dev/null 2>/dev/null
selfserv with PID 6971 found at Mon Jun  6 22:48:37 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1056: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 6971 >/dev/null 2>/dev/null
selfserv with PID 6971 found at Mon Jun  6 22:48:37 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1057: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 6971 >/dev/null 2>/dev/null
selfserv with PID 6971 found at Mon Jun  6 22:48:37 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1058: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 6971 >/dev/null 2>/dev/null
selfserv with PID 6971 found at Mon Jun  6 22:48:37 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1059: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only)
trying to kill selfserv with PID 6971 at Mon Jun  6 22:48:39 UTC 2016
kill -USR1 6971
selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6971 killed at Mon Jun  6 22:48:39 UTC 2016
ssl.sh: SSL Client Authentication Extended Test - server bypass/client normal  ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:48:40 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:48:40 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 8480 >/dev/null 2>/dev/null
selfserv with PID 8480 found at Mon Jun  6 22:48:40 UTC 2016
selfserv with PID 8480 started at Mon Jun  6 22:48:40 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1060: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 8480 at Mon Jun  6 22:48:40 UTC 2016
kill -USR1 8480
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8480 killed at Mon Jun  6 22:48:40 UTC 2016
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Mon Jun  6 22:48:40 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:48:41 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 8537 >/dev/null 2>/dev/null
selfserv with PID 8537 found at Mon Jun  6 22:48:41 UTC 2016
selfserv with PID 8537 started at Mon Jun  6 22:48:41 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1061: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 8537 at Mon Jun  6 22:48:41 UTC 2016
kill -USR1 8537
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8537 killed at Mon Jun  6 22:48:41 UTC 2016
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Mon Jun  6 22:48:42 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:48:42 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 8594 >/dev/null 2>/dev/null
selfserv with PID 8594 found at Mon Jun  6 22:48:42 UTC 2016
selfserv with PID 8594 started at Mon Jun  6 22:48:42 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1062: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 8594 at Mon Jun  6 22:48:42 UTC 2016
kill -USR1 8594
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8594 killed at Mon Jun  6 22:48:42 UTC 2016
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:48:42 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:48:42 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 8651 >/dev/null 2>/dev/null
selfserv with PID 8651 found at Mon Jun  6 22:48:42 UTC 2016
selfserv with PID 8651 started at Mon Jun  6 22:48:42 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1063: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 8651 at Mon Jun  6 22:48:43 UTC 2016
kill -USR1 8651
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8651 killed at Mon Jun  6 22:48:43 UTC 2016
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Mon Jun  6 22:48:43 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:48:43 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 8708 >/dev/null 2>/dev/null
selfserv with PID 8708 found at Mon Jun  6 22:48:43 UTC 2016
selfserv with PID 8708 started at Mon Jun  6 22:48:43 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1064: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 8708 at Mon Jun  6 22:48:44 UTC 2016
kill -USR1 8708
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8708 killed at Mon Jun  6 22:48:44 UTC 2016
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Mon Jun  6 22:48:44 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:48:44 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 8765 >/dev/null 2>/dev/null
selfserv with PID 8765 found at Mon Jun  6 22:48:44 UTC 2016
selfserv with PID 8765 started at Mon Jun  6 22:48:44 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -w nss -n ExtendedSSLUser   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1065: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 8765 at Mon Jun  6 22:48:45 UTC 2016
kill -USR1 8765
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8765 killed at Mon Jun  6 22:48:45 UTC 2016
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:48:45 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:48:45 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 8822 >/dev/null 2>/dev/null
selfserv with PID 8822 found at Mon Jun  6 22:48:45 UTC 2016
selfserv with PID 8822 started at Mon Jun  6 22:48:45 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V :ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1066: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 8822 at Mon Jun  6 22:48:46 UTC 2016
kill -USR1 8822
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8822 killed at Mon Jun  6 22:48:46 UTC 2016
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Mon Jun  6 22:48:46 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:48:46 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 8879 >/dev/null 2>/dev/null
selfserv with PID 8879 found at Mon Jun  6 22:48:46 UTC 2016
selfserv with PID 8879 started at Mon Jun  6 22:48:46 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser -w bogus  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1067: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 8879 at Mon Jun  6 22:48:46 UTC 2016
kill -USR1 8879
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8879 killed at Mon Jun  6 22:48:46 UTC 2016
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Mon Jun  6 22:48:47 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:48:47 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 8936 >/dev/null 2>/dev/null
selfserv with PID 8936 found at Mon Jun  6 22:48:47 UTC 2016
selfserv with PID 8936 started at Mon Jun  6 22:48:47 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1068: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 8936 at Mon Jun  6 22:48:47 UTC 2016
kill -USR1 8936
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8936 killed at Mon Jun  6 22:48:47 UTC 2016
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:48:47 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:48:47 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 8993 >/dev/null 2>/dev/null
selfserv with PID 8993 found at Mon Jun  6 22:48:47 UTC 2016
selfserv with PID 8993 started at Mon Jun  6 22:48:47 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V :ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1069: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 8993 at Mon Jun  6 22:48:48 UTC 2016
kill -USR1 8993
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8993 killed at Mon Jun  6 22:48:48 UTC 2016
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Mon Jun  6 22:48:48 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:48:48 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 9050 >/dev/null 2>/dev/null
selfserv with PID 9050 found at Mon Jun  6 22:48:48 UTC 2016
selfserv with PID 9050 started at Mon Jun  6 22:48:48 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser -w bogus  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1070: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9050 at Mon Jun  6 22:48:49 UTC 2016
kill -USR1 9050
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9050 killed at Mon Jun  6 22:48:49 UTC 2016
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Mon Jun  6 22:48:49 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:48:49 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 9107 >/dev/null 2>/dev/null
selfserv with PID 9107 found at Mon Jun  6 22:48:49 UTC 2016
selfserv with PID 9107 started at Mon Jun  6 22:48:49 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1071: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9107 at Mon Jun  6 22:48:50 UTC 2016
kill -USR1 9107
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9107 killed at Mon Jun  6 22:48:50 UTC 2016
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:48:50 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:48:50 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 9164 >/dev/null 2>/dev/null
selfserv with PID 9164 found at Mon Jun  6 22:48:50 UTC 2016
selfserv with PID 9164 started at Mon Jun  6 22:48:50 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3: -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1072: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9164 at Mon Jun  6 22:48:51 UTC 2016
kill -USR1 9164
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9164 killed at Mon Jun  6 22:48:51 UTC 2016
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:48:51 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:48:51 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 9221 >/dev/null 2>/dev/null
selfserv with PID 9221 found at Mon Jun  6 22:48:51 UTC 2016
selfserv with PID 9221 started at Mon Jun  6 22:48:51 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3: -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1073: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9221 at Mon Jun  6 22:48:51 UTC 2016
kill -USR1 9221
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9221 killed at Mon Jun  6 22:48:51 UTC 2016
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:48:52 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:48:52 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 9278 >/dev/null 2>/dev/null
selfserv with PID 9278 found at Mon Jun  6 22:48:52 UTC 2016
selfserv with PID 9278 started at Mon Jun  6 22:48:52 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3: -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1074: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9278 at Mon Jun  6 22:48:52 UTC 2016
kill -USR1 9278
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9278 killed at Mon Jun  6 22:48:52 UTC 2016
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:48:52 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:48:52 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 9335 >/dev/null 2>/dev/null
selfserv with PID 9335 found at Mon Jun  6 22:48:52 UTC 2016
selfserv with PID 9335 started at Mon Jun  6 22:48:53 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3: -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1075: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9335 at Mon Jun  6 22:48:53 UTC 2016
kill -USR1 9335
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9335 killed at Mon Jun  6 22:48:53 UTC 2016
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:48:53 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:48:53 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 9392 >/dev/null 2>/dev/null
selfserv with PID 9392 found at Mon Jun  6 22:48:53 UTC 2016
selfserv with PID 9392 started at Mon Jun  6 22:48:53 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3: -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1076: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9392 at Mon Jun  6 22:48:54 UTC 2016
kill -USR1 9392
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9392 killed at Mon Jun  6 22:48:54 UTC 2016
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:48:54 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:48:54 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 9449 >/dev/null 2>/dev/null
selfserv with PID 9449 found at Mon Jun  6 22:48:54 UTC 2016
selfserv with PID 9449 started at Mon Jun  6 22:48:54 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3: -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1077: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9449 at Mon Jun  6 22:48:55 UTC 2016
kill -USR1 9449
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9449 killed at Mon Jun  6 22:48:55 UTC 2016
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:48:55 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:48:55 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 9506 >/dev/null 2>/dev/null
selfserv with PID 9506 found at Mon Jun  6 22:48:55 UTC 2016
selfserv with PID 9506 started at Mon Jun  6 22:48:55 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1078: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9506 at Mon Jun  6 22:48:56 UTC 2016
kill -USR1 9506
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9506 killed at Mon Jun  6 22:48:56 UTC 2016
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:48:56 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:48:56 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 9563 >/dev/null 2>/dev/null
selfserv with PID 9563 found at Mon Jun  6 22:48:56 UTC 2016
selfserv with PID 9563 started at Mon Jun  6 22:48:56 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1079: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9563 at Mon Jun  6 22:48:57 UTC 2016
kill -USR1 9563
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9563 killed at Mon Jun  6 22:48:57 UTC 2016
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:48:57 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:48:57 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 9620 >/dev/null 2>/dev/null
selfserv with PID 9620 found at Mon Jun  6 22:48:57 UTC 2016
selfserv with PID 9620 started at Mon Jun  6 22:48:57 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1080: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9620 at Mon Jun  6 22:48:57 UTC 2016
kill -USR1 9620
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9620 killed at Mon Jun  6 22:48:57 UTC 2016
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:48:58 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:48:58 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 9677 >/dev/null 2>/dev/null
selfserv with PID 9677 found at Mon Jun  6 22:48:58 UTC 2016
selfserv with PID 9677 started at Mon Jun  6 22:48:58 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1081: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9677 at Mon Jun  6 22:48:58 UTC 2016
kill -USR1 9677
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9677 killed at Mon Jun  6 22:48:58 UTC 2016
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:48:58 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:48:58 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 9734 >/dev/null 2>/dev/null
selfserv with PID 9734 found at Mon Jun  6 22:48:58 UTC 2016
selfserv with PID 9734 started at Mon Jun  6 22:48:58 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1082: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9734 at Mon Jun  6 22:48:59 UTC 2016
kill -USR1 9734
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9734 killed at Mon Jun  6 22:48:59 UTC 2016
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:48:59 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:48:59 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 9791 >/dev/null 2>/dev/null
selfserv with PID 9791 found at Mon Jun  6 22:48:59 UTC 2016
selfserv with PID 9791 started at Mon Jun  6 22:48:59 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1083: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9791 at Mon Jun  6 22:49:00 UTC 2016
kill -USR1 9791
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9791 killed at Mon Jun  6 22:49:00 UTC 2016
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:49:00 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:49:00 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 9848 >/dev/null 2>/dev/null
selfserv with PID 9848 found at Mon Jun  6 22:49:00 UTC 2016
selfserv with PID 9848 started at Mon Jun  6 22:49:00 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1084: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9848 at Mon Jun  6 22:49:01 UTC 2016
kill -USR1 9848
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9848 killed at Mon Jun  6 22:49:01 UTC 2016
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:49:01 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:49:01 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 9905 >/dev/null 2>/dev/null
selfserv with PID 9905 found at Mon Jun  6 22:49:01 UTC 2016
selfserv with PID 9905 started at Mon Jun  6 22:49:01 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1085: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9905 at Mon Jun  6 22:49:02 UTC 2016
kill -USR1 9905
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9905 killed at Mon Jun  6 22:49:02 UTC 2016
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:49:02 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:49:02 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 9962 >/dev/null 2>/dev/null
selfserv with PID 9962 found at Mon Jun  6 22:49:02 UTC 2016
selfserv with PID 9962 started at Mon Jun  6 22:49:02 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1086: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9962 at Mon Jun  6 22:49:03 UTC 2016
kill -USR1 9962
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9962 killed at Mon Jun  6 22:49:03 UTC 2016
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:49:03 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:49:03 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 10019 >/dev/null 2>/dev/null
selfserv with PID 10019 found at Mon Jun  6 22:49:03 UTC 2016
selfserv with PID 10019 started at Mon Jun  6 22:49:03 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1087: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10019 at Mon Jun  6 22:49:03 UTC 2016
kill -USR1 10019
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10019 killed at Mon Jun  6 22:49:03 UTC 2016
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:49:04 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:49:04 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 10076 >/dev/null 2>/dev/null
selfserv with PID 10076 found at Mon Jun  6 22:49:04 UTC 2016
selfserv with PID 10076 started at Mon Jun  6 22:49:04 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1088: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10076 at Mon Jun  6 22:49:04 UTC 2016
kill -USR1 10076
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10076 killed at Mon Jun  6 22:49:04 UTC 2016
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:49:04 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:49:04 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 10133 >/dev/null 2>/dev/null
selfserv with PID 10133 found at Mon Jun  6 22:49:04 UTC 2016
selfserv with PID 10133 started at Mon Jun  6 22:49:04 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1089: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10133 at Mon Jun  6 22:49:05 UTC 2016
kill -USR1 10133
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10133 killed at Mon Jun  6 22:49:05 UTC 2016
ssl.sh: skipping  TLS Request don't require client auth (EC) (bad password) (ECC only)
ssl.sh: skipping  TLS Request don't require client auth (EC) (client auth) (ECC only)
ssl.sh: skipping  TLS Require client auth (EC) (bad password) (ECC only)
ssl.sh: skipping  TLS Require client auth (EC) (client auth) (ECC only)
ssl.sh: skipping  SSL3 Request don't require client auth (EC) (bad password) (ECC only)
ssl.sh: skipping  SSL3 Request don't require client auth (EC) (client auth) (ECC only)
ssl.sh: skipping  SSL3 Require client auth (EC) (bad password) (ECC only)
ssl.sh: skipping  SSL3 Require client auth (EC) (client auth) (ECC only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping  TLS Require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping  TLS Require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping  TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping  TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping  SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping  SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
ssl.sh: skipping  SSL3 Server hello response without SNI for Extended Test
ssl.sh: skipping  SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name on 2d HS for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
ssl.sh: SSL Stress Test Extended Test - server bypass/client normal  ===============================
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Mon Jun  6 22:49:06 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
          -w nss   -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:49:06 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 10359 >/dev/null 2>/dev/null
selfserv with PID 10359 found at Mon Jun  6 22:49:06 UTC 2016
selfserv with PID 10359 started at Mon Jun  6 22:49:06 UTC 2016
strsclnt -q -p 8443 -d ../ext_client  -w nss -c 1000 -C c -V :ssl3 \
          127.0.0.1
strsclnt started at Mon Jun  6 22:49:06 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Mon Jun  6 22:49:08 UTC 2016
ssl.sh: #1090: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10359 at Mon Jun  6 22:49:08 UTC 2016
kill -USR1 10359
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10359 killed at Mon Jun  6 22:49:08 UTC 2016
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Mon Jun  6 22:49:08 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
          -w nss   -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:49:08 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 10435 >/dev/null 2>/dev/null
selfserv with PID 10435 found at Mon Jun  6 22:49:08 UTC 2016
selfserv with PID 10435 started at Mon Jun  6 22:49:08 UTC 2016
strsclnt -q -p 8443 -d ../ext_client  -w nss -c 1000 -C c \
          127.0.0.1
strsclnt started at Mon Jun  6 22:49:08 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Mon Jun  6 22:49:10 UTC 2016
ssl.sh: #1091: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10435 at Mon Jun  6 22:49:10 UTC 2016
kill -USR1 10435
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10435 killed at Mon Jun  6 22:49:10 UTC 2016
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Mon Jun  6 22:49:10 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
          -w nss   -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:49:10 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 10511 >/dev/null 2>/dev/null
selfserv with PID 10511 found at Mon Jun  6 22:49:10 UTC 2016
selfserv with PID 10511 started at Mon Jun  6 22:49:10 UTC 2016
strsclnt -q -p 8443 -d ../ext_client  -w nss -c 1000 -C c -g \
          127.0.0.1
strsclnt started at Mon Jun  6 22:49:10 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Mon Jun  6 22:49:12 UTC 2016
ssl.sh: #1092: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10511 at Mon Jun  6 22:49:12 UTC 2016
kill -USR1 10511
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10511 killed at Mon Jun  6 22:49:12 UTC 2016
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Mon Jun  6 22:49:12 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
          -w nss -u -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:49:12 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 10587 >/dev/null 2>/dev/null
selfserv with PID 10587 found at Mon Jun  6 22:49:12 UTC 2016
selfserv with PID 10587 started at Mon Jun  6 22:49:12 UTC 2016
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3: -c 1000 -C c -u \
          127.0.0.1
strsclnt started at Mon Jun  6 22:49:12 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Mon Jun  6 22:49:14 UTC 2016
ssl.sh: #1093: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10587 at Mon Jun  6 22:49:14 UTC 2016
kill -USR1 10587
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10587 killed at Mon Jun  6 22:49:14 UTC 2016
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Mon Jun  6 22:49:14 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
          -w nss -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:49:14 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 10663 >/dev/null 2>/dev/null
selfserv with PID 10663 found at Mon Jun  6 22:49:14 UTC 2016
selfserv with PID 10663 started at Mon Jun  6 22:49:14 UTC 2016
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3: -c 1000 -C c -z \
          127.0.0.1
strsclnt started at Mon Jun  6 22:49:14 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Mon Jun  6 22:49:16 UTC 2016
ssl.sh: #1094: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10663 at Mon Jun  6 22:49:16 UTC 2016
kill -USR1 10663
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10663 killed at Mon Jun  6 22:49:16 UTC 2016
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Mon Jun  6 22:49:16 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
          -w nss -u -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:49:16 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 10739 >/dev/null 2>/dev/null
selfserv with PID 10739 found at Mon Jun  6 22:49:16 UTC 2016
selfserv with PID 10739 started at Mon Jun  6 22:49:16 UTC 2016
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3: -c 1000 -C c -u -z \
          127.0.0.1
strsclnt started at Mon Jun  6 22:49:16 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Mon Jun  6 22:49:18 UTC 2016
ssl.sh: #1095: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10739 at Mon Jun  6 22:49:18 UTC 2016
kill -USR1 10739
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10739 killed at Mon Jun  6 22:49:18 UTC 2016
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Mon Jun  6 22:49:19 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
          -w nss -u -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:49:19 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 10815 >/dev/null 2>/dev/null
selfserv with PID 10815 found at Mon Jun  6 22:49:19 UTC 2016
selfserv with PID 10815 started at Mon Jun  6 22:49:19 UTC 2016
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3: -c 1000 -C c -u -z -g \
          127.0.0.1
strsclnt started at Mon Jun  6 22:49:19 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Mon Jun  6 22:49:21 UTC 2016
ssl.sh: #1096: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10815 at Mon Jun  6 22:49:21 UTC 2016
kill -USR1 10815
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10815 killed at Mon Jun  6 22:49:21 UTC 2016
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Mon Jun  6 22:49:21 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:49:21 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 10923 >/dev/null 2>/dev/null
selfserv with PID 10923 found at Mon Jun  6 22:49:21 UTC 2016
selfserv with PID 10923 started at Mon Jun  6 22:49:21 UTC 2016
strsclnt -q -p 8443 -d ../ext_client  -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \
          127.0.0.1
strsclnt started at Mon Jun  6 22:49:21 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Mon Jun  6 22:49:24 UTC 2016
ssl.sh: #1097: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10923 at Mon Jun  6 22:49:24 UTC 2016
kill -USR1 10923
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10923 killed at Mon Jun  6 22:49:24 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Mon Jun  6 22:49:24 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:49:24 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 11097 >/dev/null 2>/dev/null
selfserv with PID 11097 found at Mon Jun  6 22:49:24 UTC 2016
selfserv with PID 11097 started at Mon Jun  6 22:49:24 UTC 2016
strsclnt -q -p 8443 -d ../ext_client  -w nss -c 100 -C c -N -n ExtendedSSLUser \
          127.0.0.1
strsclnt started at Mon Jun  6 22:49:24 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Mon Jun  6 22:49:26 UTC 2016
ssl.sh: #1098: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11097 at Mon Jun  6 22:49:26 UTC 2016
kill -USR1 11097
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11097 killed at Mon Jun  6 22:49:26 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Mon Jun  6 22:49:27 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
          -w nss -r -r -u -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:49:27 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 11235 >/dev/null 2>/dev/null
selfserv with PID 11235 found at Mon Jun  6 22:49:27 UTC 2016
selfserv with PID 11235 started at Mon Jun  6 22:49:27 UTC 2016
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \
          127.0.0.1
strsclnt started at Mon Jun  6 22:49:27 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Mon Jun  6 22:49:27 UTC 2016
ssl.sh: #1099: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11235 at Mon Jun  6 22:49:27 UTC 2016
kill -USR1 11235
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11235 killed at Mon Jun  6 22:49:27 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Mon Jun  6 22:49:28 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
          -w nss -r -r -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:49:28 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 11356 >/dev/null 2>/dev/null
selfserv with PID 11356 found at Mon Jun  6 22:49:28 UTC 2016
selfserv with PID 11356 started at Mon Jun  6 22:49:28 UTC 2016
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \
          127.0.0.1
strsclnt started at Mon Jun  6 22:49:28 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Mon Jun  6 22:49:29 UTC 2016
ssl.sh: #1100: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11356 at Mon Jun  6 22:49:29 UTC 2016
kill -USR1 11356
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11356 killed at Mon Jun  6 22:49:29 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Mon Jun  6 22:49:29 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
          -w nss -r -r -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:49:29 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 11458 >/dev/null 2>/dev/null
selfserv with PID 11458 found at Mon Jun  6 22:49:29 UTC 2016
selfserv with PID 11458 started at Mon Jun  6 22:49:29 UTC 2016
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \
          127.0.0.1
strsclnt started at Mon Jun  6 22:49:29 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Mon Jun  6 22:49:30 UTC 2016
ssl.sh: #1101: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11458 at Mon Jun  6 22:49:30 UTC 2016
kill -USR1 11458
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11458 killed at Mon Jun  6 22:49:30 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Mon Jun  6 22:49:30 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
          -w nss -r -r -u -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:49:30 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 11539 >/dev/null 2>/dev/null
selfserv with PID 11539 found at Mon Jun  6 22:49:30 UTC 2016
selfserv with PID 11539 started at Mon Jun  6 22:49:30 UTC 2016
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \
          127.0.0.1
strsclnt started at Mon Jun  6 22:49:30 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Mon Jun  6 22:49:31 UTC 2016
ssl.sh: #1102: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11539 at Mon Jun  6 22:49:31 UTC 2016
kill -USR1 11539
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11539 killed at Mon Jun  6 22:49:31 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Mon Jun  6 22:49:31 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
          -w nss -r -r -u -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:49:31 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 11640 >/dev/null 2>/dev/null
selfserv with PID 11640 found at Mon Jun  6 22:49:31 UTC 2016
selfserv with PID 11640 started at Mon Jun  6 22:49:31 UTC 2016
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \
          127.0.0.1
strsclnt started at Mon Jun  6 22:49:31 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Mon Jun  6 22:49:32 UTC 2016
ssl.sh: #1103: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11640 at Mon Jun  6 22:49:32 UTC 2016
kill -USR1 11640
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11640 killed at Mon Jun  6 22:49:32 UTC 2016
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test
ssl.sh: skipping  Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only)
ssl.sh: skipping  Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA (ECC only)
ssl.sh: skipping  Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) (ECC only)
ssl.sh: skipping  Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) (ECC only)
ssl.sh: skipping  Stress TLS  ECDHE-RSA   AES 128 CBC with SHA (ECC only)
ssl.sh: skipping  Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) (ECC only)
ssl.sh: skipping  Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only)
ssl.sh: skipping  Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only)
ssl.sh: skipping  Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only)
ssl.sh: skipping  Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only)
ssl.sh: skipping  Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only)
ssl.sh: skipping  Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only)
ssl.sh: SSL Cipher Coverage  - server normal/client bypass  ===============================
selfserv starting at Mon Jun  6 22:49:33 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:49:33 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:33 UTC 2016
selfserv with PID 11820 started at Mon Jun  6 22:49:33 UTC 2016
ssl.sh: running SSL2_RC4_128_WITH_MD5 ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:33 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c A -V ssl2:ssl3 -O -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1104: SSL2_RC4_128_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC4_128_EXPORT40_WITH_MD5 ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:34 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c B -V ssl2:tls1.0 -O -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1105: SSL2_RC4_128_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC2_128_CBC_WITH_MD5 ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:34 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c C -V ssl2:tls1.0 -O -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 128-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1106: SSL2_RC2_128_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:34 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c D -V ssl2:ssl3 -O -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1107: SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_DES_64_CBC_WITH_MD5 ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:35 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c E -V ssl2:tls1.0 -O -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 56-bit DES with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1108: SSL2_DES_64_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_DES_192_EDE3_CBC_WITH_MD5 ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:35 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c F -V ssl2:ssl3 -O -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 112-bit 3DES with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1109: SSL2_DES_192_EDE3_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC4_128_EXPORT40_WITH_MD5 ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:35 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c B -V ssl2:tls1.1 -O -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1110: SSL2_RC4_128_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC2_128_CBC_WITH_MD5 ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:35 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c C -V ssl2:tls1.1 -O -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 128-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1111: SSL2_RC2_128_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_DES_64_CBC_WITH_MD5 ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:36 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c E -V ssl2:tls1.1 -O -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 56-bit DES with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1112: SSL2_DES_64_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:36 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1113: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:36 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1114: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:36 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1115: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:36 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c f -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1116: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:37 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c g -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1117: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:37 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1118: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:37 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1119: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:37 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1120: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:37 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12229:
SSL peer was not expecting a handshake message it received.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: write to SSL socket failed: SSL received an unexpected Server Hello Done handshake message.
tstclnt: exiting with return code 254
ssl.sh: #1121: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 254, expected is 0 - FAILED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:38 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12229:
SSL peer was not expecting a handshake message it received.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: write to SSL socket failed: SSL received an unexpected Server Hello Done handshake message.
tstclnt: exiting with return code 254
ssl.sh: #1122: SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 254, expected is 0 - FAILED
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:38 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1123: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:38 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1124: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:38 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1125: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:38 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1126: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:39 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.0  -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1127: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:39 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.0  -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1128: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:39 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.0  -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1129: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:39 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c f -V ssl3:tls1.0  -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1130: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:39 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c g -V ssl3:tls1.0  -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1131: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:40 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.0  -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1132: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:40 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.0  -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1133: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:40 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.0  -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1134: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:40 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:tls1.0  -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12229:
SSL peer was not expecting a handshake message it received.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: write to SSL socket failed: SSL received an unexpected Server Hello Done handshake message.
tstclnt: exiting with return code 254
ssl.sh: #1135: TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 254, expected is 0 - FAILED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:40 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:tls1.0  -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12229:
SSL peer was not expecting a handshake message it received.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: write to SSL socket failed: SSL received an unexpected Server Hello Done handshake message.
tstclnt: exiting with return code 254
ssl.sh: #1136: TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 254, expected is 0 - FAILED
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:41 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.0  -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1137: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:41 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.0  -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1138: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:41 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.0  -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1139: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:41 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.0  -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1140: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:42 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1141: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:42 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1142: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:42 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1143: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:42 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1144: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:42 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1145: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:43 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1146: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:43 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12229:
SSL peer was not expecting a handshake message it received.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: write to SSL socket failed: SSL received an unexpected Server Hello Done handshake message.
tstclnt: exiting with return code 254
ssl.sh: #1147: TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 254, expected is 0 - FAILED
ssl.sh: running TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:43 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12229:
SSL peer was not expecting a handshake message it received.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: write to SSL socket failed: SSL received an unexpected Server Hello Done handshake message.
tstclnt: exiting with return code 254
ssl.sh: #1148: TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 254, expected is 0 - FAILED
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:43 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1149: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:43 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1150: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:44 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1151: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 11820 >/dev/null 2>/dev/null
selfserv with PID 11820 found at Mon Jun  6 22:49:44 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1152: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only)
trying to kill selfserv with PID 11820 at Mon Jun  6 22:49:46 UTC 2016
kill -USR1 11820
selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11820 killed at Mon Jun  6 22:49:46 UTC 2016
ssl.sh: SSL Client Authentication  - server normal/client bypass  ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:49:46 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:49:46 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 13552 >/dev/null 2>/dev/null
selfserv with PID 13552 found at Mon Jun  6 22:49:46 UTC 2016
selfserv with PID 13552 started at Mon Jun  6 22:49:46 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1153: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13552 at Mon Jun  6 22:49:47 UTC 2016
kill -USR1 13552
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13552 killed at Mon Jun  6 22:49:47 UTC 2016
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Mon Jun  6 22:49:47 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:49:47 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 13609 >/dev/null 2>/dev/null
selfserv with PID 13609 found at Mon Jun  6 22:49:47 UTC 2016
selfserv with PID 13609 started at Mon Jun  6 22:49:47 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -w bogus -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1154: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13609 at Mon Jun  6 22:49:48 UTC 2016
kill -USR1 13609
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13609 killed at Mon Jun  6 22:49:48 UTC 2016
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Mon Jun  6 22:49:48 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:49:48 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 13666 >/dev/null 2>/dev/null
selfserv with PID 13666 found at Mon Jun  6 22:49:48 UTC 2016
selfserv with PID 13666 started at Mon Jun  6 22:49:48 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -w nss -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1155: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13666 at Mon Jun  6 22:49:48 UTC 2016
kill -USR1 13666
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13666 killed at Mon Jun  6 22:49:48 UTC 2016
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:49:49 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:49:49 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 13723 >/dev/null 2>/dev/null
selfserv with PID 13723 found at Mon Jun  6 22:49:49 UTC 2016
selfserv with PID 13723 started at Mon Jun  6 22:49:49 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1156: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 13723 at Mon Jun  6 22:49:49 UTC 2016
kill -USR1 13723
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13723 killed at Mon Jun  6 22:49:49 UTC 2016
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Mon Jun  6 22:49:49 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:49:49 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 13780 >/dev/null 2>/dev/null
selfserv with PID 13780 found at Mon Jun  6 22:49:49 UTC 2016
selfserv with PID 13780 started at Mon Jun  6 22:49:49 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -w bogus -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1157: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 13780 at Mon Jun  6 22:49:50 UTC 2016
kill -USR1 13780
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13780 killed at Mon Jun  6 22:49:50 UTC 2016
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Mon Jun  6 22:49:50 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:49:50 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 13837 >/dev/null 2>/dev/null
selfserv with PID 13837 found at Mon Jun  6 22:49:50 UTC 2016
selfserv with PID 13837 started at Mon Jun  6 22:49:50 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -w nss -n TestUser   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1158: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13837 at Mon Jun  6 22:49:51 UTC 2016
kill -USR1 13837
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13837 killed at Mon Jun  6 22:49:51 UTC 2016
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:49:51 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:49:51 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 13894 >/dev/null 2>/dev/null
selfserv with PID 13894 found at Mon Jun  6 22:49:51 UTC 2016
selfserv with PID 13894 started at Mon Jun  6 22:49:51 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V :ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1159: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13894 at Mon Jun  6 22:49:52 UTC 2016
kill -USR1 13894
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13894 killed at Mon Jun  6 22:49:52 UTC 2016
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Mon Jun  6 22:49:52 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:49:52 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 13951 >/dev/null 2>/dev/null
selfserv with PID 13951 found at Mon Jun  6 22:49:52 UTC 2016
selfserv with PID 13951 started at Mon Jun  6 22:49:52 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser -w bogus  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1160: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13951 at Mon Jun  6 22:49:53 UTC 2016
kill -USR1 13951
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13951 killed at Mon Jun  6 22:49:53 UTC 2016
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Mon Jun  6 22:49:53 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:49:53 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 14008 >/dev/null 2>/dev/null
selfserv with PID 14008 found at Mon Jun  6 22:49:53 UTC 2016
selfserv with PID 14008 started at Mon Jun  6 22:49:53 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1161: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14008 at Mon Jun  6 22:49:53 UTC 2016
kill -USR1 14008
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14008 killed at Mon Jun  6 22:49:53 UTC 2016
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:49:54 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:49:54 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 14065 >/dev/null 2>/dev/null
selfserv with PID 14065 found at Mon Jun  6 22:49:54 UTC 2016
selfserv with PID 14065 started at Mon Jun  6 22:49:54 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V :ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1162: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 14065 at Mon Jun  6 22:49:54 UTC 2016
kill -USR1 14065
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14065 killed at Mon Jun  6 22:49:54 UTC 2016
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Mon Jun  6 22:49:54 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:49:54 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 14122 >/dev/null 2>/dev/null
selfserv with PID 14122 found at Mon Jun  6 22:49:54 UTC 2016
selfserv with PID 14122 started at Mon Jun  6 22:49:54 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser -w bogus  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1163: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 14122 at Mon Jun  6 22:49:55 UTC 2016
kill -USR1 14122
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14122 killed at Mon Jun  6 22:49:55 UTC 2016
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Mon Jun  6 22:49:55 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:49:55 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 14179 >/dev/null 2>/dev/null
selfserv with PID 14179 found at Mon Jun  6 22:49:55 UTC 2016
selfserv with PID 14179 started at Mon Jun  6 22:49:55 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1164: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14179 at Mon Jun  6 22:49:56 UTC 2016
kill -USR1 14179
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14179 killed at Mon Jun  6 22:49:56 UTC 2016
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:49:56 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:49:56 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 14236 >/dev/null 2>/dev/null
selfserv with PID 14236 found at Mon Jun  6 22:49:56 UTC 2016
selfserv with PID 14236 started at Mon Jun  6 22:49:56 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3: -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1165: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14236 at Mon Jun  6 22:49:57 UTC 2016
kill -USR1 14236
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14236 killed at Mon Jun  6 22:49:57 UTC 2016
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:49:57 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:49:57 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 14293 >/dev/null 2>/dev/null
selfserv with PID 14293 found at Mon Jun  6 22:49:57 UTC 2016
selfserv with PID 14293 started at Mon Jun  6 22:49:57 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3: -w bogus -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1166: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14293 at Mon Jun  6 22:49:58 UTC 2016
kill -USR1 14293
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14293 killed at Mon Jun  6 22:49:58 UTC 2016
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:49:58 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:49:58 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 14350 >/dev/null 2>/dev/null
selfserv with PID 14350 found at Mon Jun  6 22:49:58 UTC 2016
selfserv with PID 14350 started at Mon Jun  6 22:49:58 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1167: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14350 at Mon Jun  6 22:49:58 UTC 2016
kill -USR1 14350
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14350 killed at Mon Jun  6 22:49:58 UTC 2016
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:49:58 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:49:59 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 14407 >/dev/null 2>/dev/null
selfserv with PID 14407 found at Mon Jun  6 22:49:59 UTC 2016
selfserv with PID 14407 started at Mon Jun  6 22:49:59 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3: -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1168: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 14407 at Mon Jun  6 22:49:59 UTC 2016
kill -USR1 14407
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14407 killed at Mon Jun  6 22:49:59 UTC 2016
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:49:59 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:49:59 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 14464 >/dev/null 2>/dev/null
selfserv with PID 14464 found at Mon Jun  6 22:49:59 UTC 2016
selfserv with PID 14464 started at Mon Jun  6 22:49:59 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3: -w bogus -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1169: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 14464 at Mon Jun  6 22:50:00 UTC 2016
kill -USR1 14464
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14464 killed at Mon Jun  6 22:50:00 UTC 2016
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:50:00 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:50:00 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 14521 >/dev/null 2>/dev/null
selfserv with PID 14521 found at Mon Jun  6 22:50:00 UTC 2016
selfserv with PID 14521 started at Mon Jun  6 22:50:00 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1170: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14521 at Mon Jun  6 22:50:01 UTC 2016
kill -USR1 14521
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14521 killed at Mon Jun  6 22:50:01 UTC 2016
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:50:01 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:50:01 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 14581 >/dev/null 2>/dev/null
selfserv with PID 14581 found at Mon Jun  6 22:50:01 UTC 2016
selfserv with PID 14581 started at Mon Jun  6 22:50:01 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1171: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14581 at Mon Jun  6 22:50:02 UTC 2016
kill -USR1 14581
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14581 killed at Mon Jun  6 22:50:02 UTC 2016
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:50:02 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:50:02 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 14644 >/dev/null 2>/dev/null
selfserv with PID 14644 found at Mon Jun  6 22:50:02 UTC 2016
selfserv with PID 14644 started at Mon Jun  6 22:50:02 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1172: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14644 at Mon Jun  6 22:50:03 UTC 2016
kill -USR1 14644
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14644 killed at Mon Jun  6 22:50:03 UTC 2016
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:50:03 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:50:03 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 14702 >/dev/null 2>/dev/null
selfserv with PID 14702 found at Mon Jun  6 22:50:03 UTC 2016
selfserv with PID 14702 started at Mon Jun  6 22:50:03 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1173: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14702 at Mon Jun  6 22:50:04 UTC 2016
kill -USR1 14702
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14702 killed at Mon Jun  6 22:50:04 UTC 2016
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:50:04 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:50:04 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 14783 >/dev/null 2>/dev/null
selfserv with PID 14783 found at Mon Jun  6 22:50:04 UTC 2016
selfserv with PID 14783 started at Mon Jun  6 22:50:04 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1174: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 14783 at Mon Jun  6 22:50:05 UTC 2016
kill -USR1 14783
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14783 killed at Mon Jun  6 22:50:05 UTC 2016
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:50:05 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:50:05 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 14840 >/dev/null 2>/dev/null
selfserv with PID 14840 found at Mon Jun  6 22:50:05 UTC 2016
selfserv with PID 14840 started at Mon Jun  6 22:50:05 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1175: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 14840 at Mon Jun  6 22:50:05 UTC 2016
kill -USR1 14840
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14840 killed at Mon Jun  6 22:50:06 UTC 2016
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:50:06 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:50:06 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 14897 >/dev/null 2>/dev/null
selfserv with PID 14897 found at Mon Jun  6 22:50:06 UTC 2016
selfserv with PID 14897 started at Mon Jun  6 22:50:06 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1176: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14897 at Mon Jun  6 22:50:06 UTC 2016
kill -USR1 14897
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14897 killed at Mon Jun  6 22:50:06 UTC 2016
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:50:06 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:50:07 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 14962 >/dev/null 2>/dev/null
selfserv with PID 14962 found at Mon Jun  6 22:50:07 UTC 2016
selfserv with PID 14962 started at Mon Jun  6 22:50:07 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1177: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14962 at Mon Jun  6 22:50:07 UTC 2016
kill -USR1 14962
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14962 killed at Mon Jun  6 22:50:07 UTC 2016
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:50:07 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:50:07 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 15019 >/dev/null 2>/dev/null
selfserv with PID 15019 found at Mon Jun  6 22:50:07 UTC 2016
selfserv with PID 15019 started at Mon Jun  6 22:50:07 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser -w bogus  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1178: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15019 at Mon Jun  6 22:50:08 UTC 2016
kill -USR1 15019
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15019 killed at Mon Jun  6 22:50:08 UTC 2016
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:50:08 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:50:08 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 15076 >/dev/null 2>/dev/null
selfserv with PID 15076 found at Mon Jun  6 22:50:08 UTC 2016
selfserv with PID 15076 started at Mon Jun  6 22:50:08 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1179: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15076 at Mon Jun  6 22:50:09 UTC 2016
kill -USR1 15076
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15076 killed at Mon Jun  6 22:50:09 UTC 2016
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:50:09 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:50:09 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 15136 >/dev/null 2>/dev/null
selfserv with PID 15136 found at Mon Jun  6 22:50:09 UTC 2016
selfserv with PID 15136 started at Mon Jun  6 22:50:09 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1180: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 15136 at Mon Jun  6 22:50:10 UTC 2016
kill -USR1 15136
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15136 killed at Mon Jun  6 22:50:10 UTC 2016
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:50:10 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:50:10 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 15196 >/dev/null 2>/dev/null
selfserv with PID 15196 found at Mon Jun  6 22:50:10 UTC 2016
selfserv with PID 15196 started at Mon Jun  6 22:50:10 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser -w bogus  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1181: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 15196 at Mon Jun  6 22:50:11 UTC 2016
kill -USR1 15196
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15196 killed at Mon Jun  6 22:50:11 UTC 2016
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:50:11 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:50:11 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 15253 >/dev/null 2>/dev/null
selfserv with PID 15253 found at Mon Jun  6 22:50:11 UTC 2016
selfserv with PID 15253 started at Mon Jun  6 22:50:11 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1182: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15253 at Mon Jun  6 22:50:12 UTC 2016
kill -USR1 15253
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15253 killed at Mon Jun  6 22:50:12 UTC 2016
ssl.sh: skipping  TLS Request don't require client auth (EC) (bad password) (ECC only)
ssl.sh: skipping  TLS Request don't require client auth (EC) (client auth) (ECC only)
ssl.sh: skipping  TLS Require client auth (EC) (bad password) (ECC only)
ssl.sh: skipping  TLS Require client auth (EC) (client auth) (ECC only)
ssl.sh: skipping  SSL3 Request don't require client auth (EC) (bad password) (ECC only)
ssl.sh: skipping  SSL3 Request don't require client auth (EC) (client auth) (ECC only)
ssl.sh: skipping  SSL3 Require client auth (EC) (bad password) (ECC only)
ssl.sh: skipping  SSL3 Require client auth (EC) (client auth) (ECC only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping  TLS Require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping  TLS Require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping  TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping  TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping  SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping  SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Mon Jun  6 22:50:12 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:50:12 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 15386 >/dev/null 2>/dev/null
selfserv with PID 15386 found at Mon Jun  6 22:50:12 UTC 2016
selfserv with PID 15386 started at Mon Jun  6 22:50:12 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1183: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15386 at Mon Jun  6 22:50:13 UTC 2016
kill -USR1 15386
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15386 killed at Mon Jun  6 22:50:13 UTC 2016
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Mon Jun  6 22:50:13 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:50:13 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 15449 >/dev/null 2>/dev/null
selfserv with PID 15449 found at Mon Jun  6 22:50:13 UTC 2016
selfserv with PID 15449 started at Mon Jun  6 22:50:13 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser -a testbuildd-sni.(none)  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=testbuildd-sni.(none),E=testbuildd-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1184: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15449 at Mon Jun  6 22:50:14 UTC 2016
kill -USR1 15449
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15449 killed at Mon Jun  6 22:50:14 UTC 2016
ssl.sh: TLS Server response with alert ----
selfserv starting at Mon Jun  6 22:50:14 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:50:14 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 15512 >/dev/null 2>/dev/null
selfserv with PID 15512 found at Mon Jun  6 22:50:14 UTC 2016
selfserv with PID 15512 started at Mon Jun  6 22:50:14 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser -a testbuildd-sni1.(none)  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #1185: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 15512 at Mon Jun  6 22:50:14 UTC 2016
kill -USR1 15512
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15512 killed at Mon Jun  6 22:50:14 UTC 2016
ssl.sh: SSL3 Server hello response without SNI ----
selfserv starting at Mon Jun  6 22:50:15 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:50:15 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 15575 >/dev/null 2>/dev/null
selfserv with PID 15575 found at Mon Jun  6 22:50:15 UTC 2016
selfserv with PID 15575 started at Mon Jun  6 22:50:15 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -w nss -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1186: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15575 at Mon Jun  6 22:50:15 UTC 2016
kill -USR1 15575
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15575 killed at Mon Jun  6 22:50:15 UTC 2016
ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ----
selfserv starting at Mon Jun  6 22:50:15 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:50:16 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 15638 >/dev/null 2>/dev/null
selfserv with PID 15638 found at Mon Jun  6 22:50:16 UTC 2016
selfserv with PID 15638 started at Mon Jun  6 22:50:16 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -w nss -n TestUser -a testbuildd-sni.(none)  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: authentication of server cert failed: Unable to communicate securely with peer: requested domain name does not match the server's certificate.
tstclnt: exiting with return code 254
ssl.sh: #1187: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 15638 at Mon Jun  6 22:50:16 UTC 2016
kill -USR1 15638
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15638 killed at Mon Jun  6 22:50:16 UTC 2016
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Mon Jun  6 22:50:16 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:50:16 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 15701 >/dev/null 2>/dev/null
selfserv with PID 15701 found at Mon Jun  6 22:50:16 UTC 2016
selfserv with PID 15701 started at Mon Jun  6 22:50:16 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1188: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15701 at Mon Jun  6 22:50:17 UTC 2016
kill -USR1 15701
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15701 killed at Mon Jun  6 22:50:17 UTC 2016
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Mon Jun  6 22:50:17 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:50:17 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 15764 >/dev/null 2>/dev/null
selfserv with PID 15764 found at Mon Jun  6 22:50:17 UTC 2016
selfserv with PID 15764 started at Mon Jun  6 22:50:17 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser -a testbuildd-sni.(none)  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=testbuildd-sni.(none),E=testbuildd-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=testbuildd-sni.(none),E=testbuildd-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1189: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15764 at Mon Jun  6 22:50:18 UTC 2016
kill -USR1 15764
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15764 killed at Mon Jun  6 22:50:18 UTC 2016
ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ----
selfserv starting at Mon Jun  6 22:50:18 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:50:18 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 15827 >/dev/null 2>/dev/null
selfserv with PID 15827 found at Mon Jun  6 22:50:18 UTC 2016
selfserv with PID 15827 started at Mon Jun  6 22:50:18 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser -a testbuildd-sni.(none) -a testbuildd.(none)  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=testbuildd-sni.(none),E=testbuildd-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 1
ssl.sh: #1190: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 15827 at Mon Jun  6 22:50:19 UTC 2016
kill -USR1 15827
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15827 killed at Mon Jun  6 22:50:19 UTC 2016
ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ----
selfserv starting at Mon Jun  6 22:50:19 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:50:19 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 15890 >/dev/null 2>/dev/null
selfserv with PID 15890 found at Mon Jun  6 22:50:19 UTC 2016
selfserv with PID 15890 started at Mon Jun  6 22:50:19 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser -a testbuildd-sni.(none) -a testbuildd-sni1.(none)  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=testbuildd-sni.(none),E=testbuildd-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 1
ssl.sh: #1191: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 15890 at Mon Jun  6 22:50:20 UTC 2016
kill -USR1 15890
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15890 killed at Mon Jun  6 22:50:20 UTC 2016
ssl.sh: TLS Server response with alert ----
selfserv starting at Mon Jun  6 22:50:20 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:50:20 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 15953 >/dev/null 2>/dev/null
selfserv with PID 15953 found at Mon Jun  6 22:50:20 UTC 2016
selfserv with PID 15953 started at Mon Jun  6 22:50:20 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser -a testbuildd-sni1.(none)  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #1192: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 15953 at Mon Jun  6 22:50:20 UTC 2016
kill -USR1 15953
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15953 killed at Mon Jun  6 22:50:21 UTC 2016
ssl.sh: SSL Stress Test  - server normal/client bypass  ===============================
ssl.sh: Stress SSL2 RC4 128 with MD5 ----
selfserv starting at Mon Jun  6 22:50:21 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss   -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:50:21 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 16085 >/dev/null 2>/dev/null
selfserv with PID 16085 found at Mon Jun  6 22:50:21 UTC 2016
selfserv with PID 16085 started at Mon Jun  6 22:50:21 UTC 2016
strsclnt -q -p 8443 -d ../client -B -s -w nss -c 1000 -C A \
          127.0.0.1
strsclnt started at Mon Jun  6 22:50:21 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: SSL2 - 1 server certificates tested.
strsclnt completed at Mon Jun  6 22:50:22 UTC 2016
ssl.sh: #1193: Stress SSL2 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 16085 at Mon Jun  6 22:50:23 UTC 2016
kill -USR1 16085
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16085 killed at Mon Jun  6 22:50:23 UTC 2016
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Mon Jun  6 22:50:23 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss   -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:50:23 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 16161 >/dev/null 2>/dev/null
selfserv with PID 16161 found at Mon Jun  6 22:50:23 UTC 2016
selfserv with PID 16161 started at Mon Jun  6 22:50:23 UTC 2016
strsclnt -q -p 8443 -d ../client -B -s -w nss -c 1000 -C c -V :ssl3 \
          127.0.0.1
strsclnt started at Mon Jun  6 22:50:23 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Mon Jun  6 22:50:24 UTC 2016
ssl.sh: #1194: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 16161 at Mon Jun  6 22:50:24 UTC 2016
kill -USR1 16161
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16161 killed at Mon Jun  6 22:50:24 UTC 2016
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Mon Jun  6 22:50:24 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss   -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:50:25 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 16237 >/dev/null 2>/dev/null
selfserv with PID 16237 found at Mon Jun  6 22:50:25 UTC 2016
selfserv with PID 16237 started at Mon Jun  6 22:50:25 UTC 2016
strsclnt -q -p 8443 -d ../client -B -s -w nss -c 1000 -C c \
          127.0.0.1
strsclnt started at Mon Jun  6 22:50:25 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Mon Jun  6 22:50:26 UTC 2016
ssl.sh: #1195: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 16237 at Mon Jun  6 22:50:26 UTC 2016
kill -USR1 16237
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16237 killed at Mon Jun  6 22:50:26 UTC 2016
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Mon Jun  6 22:50:26 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss   -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:50:26 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 16314 >/dev/null 2>/dev/null
selfserv with PID 16314 found at Mon Jun  6 22:50:26 UTC 2016
selfserv with PID 16314 started at Mon Jun  6 22:50:26 UTC 2016
strsclnt -q -p 8443 -d ../client -B -s -w nss -c 1000 -C c -g \
          127.0.0.1
strsclnt started at Mon Jun  6 22:50:26 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Mon Jun  6 22:50:28 UTC 2016
ssl.sh: #1196: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 16314 at Mon Jun  6 22:50:28 UTC 2016
kill -USR1 16314
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16314 killed at Mon Jun  6 22:50:28 UTC 2016
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Mon Jun  6 22:50:28 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -u -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:50:28 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 16390 >/dev/null 2>/dev/null
selfserv with PID 16390 found at Mon Jun  6 22:50:28 UTC 2016
selfserv with PID 16390 started at Mon Jun  6 22:50:28 UTC 2016
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u \
          127.0.0.1
strsclnt started at Mon Jun  6 22:50:28 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Mon Jun  6 22:50:30 UTC 2016
ssl.sh: #1197: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 16390 at Mon Jun  6 22:50:30 UTC 2016
kill -USR1 16390
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16390 killed at Mon Jun  6 22:50:30 UTC 2016
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Mon Jun  6 22:50:30 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:50:30 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 16466 >/dev/null 2>/dev/null
selfserv with PID 16466 found at Mon Jun  6 22:50:30 UTC 2016
selfserv with PID 16466 started at Mon Jun  6 22:50:30 UTC 2016
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -z \
          127.0.0.1
strsclnt started at Mon Jun  6 22:50:30 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Mon Jun  6 22:50:32 UTC 2016
ssl.sh: #1198: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 16466 at Mon Jun  6 22:50:32 UTC 2016
kill -USR1 16466
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16466 killed at Mon Jun  6 22:50:32 UTC 2016
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Mon Jun  6 22:50:32 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -u -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:50:32 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 16542 >/dev/null 2>/dev/null
selfserv with PID 16542 found at Mon Jun  6 22:50:33 UTC 2016
selfserv with PID 16542 started at Mon Jun  6 22:50:33 UTC 2016
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \
          127.0.0.1
strsclnt started at Mon Jun  6 22:50:33 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Mon Jun  6 22:50:35 UTC 2016
ssl.sh: #1199: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 16542 at Mon Jun  6 22:50:35 UTC 2016
kill -USR1 16542
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16542 killed at Mon Jun  6 22:50:35 UTC 2016
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Mon Jun  6 22:50:35 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -u -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:50:35 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 16619 >/dev/null 2>/dev/null
selfserv with PID 16619 found at Mon Jun  6 22:50:35 UTC 2016
selfserv with PID 16619 started at Mon Jun  6 22:50:35 UTC 2016
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \
          127.0.0.1
strsclnt started at Mon Jun  6 22:50:35 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Mon Jun  6 22:50:37 UTC 2016
ssl.sh: #1200: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 16619 at Mon Jun  6 22:50:37 UTC 2016
kill -USR1 16619
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16619 killed at Mon Jun  6 22:50:37 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ----
selfserv starting at Mon Jun  6 22:50:37 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -u -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:50:37 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 16701 >/dev/null 2>/dev/null
selfserv with PID 16701 found at Mon Jun  6 22:50:37 UTC 2016
selfserv with PID 16701 started at Mon Jun  6 22:50:37 UTC 2016
strsclnt -q -p 8443 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \
          127.0.0.1
strsclnt started at Mon Jun  6 22:50:37 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Mon Jun  6 22:50:39 UTC 2016
ssl.sh: #1201: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 16701 at Mon Jun  6 22:50:39 UTC 2016
kill -USR1 16701
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16701 killed at Mon Jun  6 22:50:39 UTC 2016
ssl.sh: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Mon Jun  6 22:50:39 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:50:39 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 16798 >/dev/null 2>/dev/null
selfserv with PID 16798 found at Mon Jun  6 22:50:39 UTC 2016
selfserv with PID 16798 started at Mon Jun  6 22:50:39 UTC 2016
strsclnt -q -p 8443 -d ../client -B -s -w nss -c 100 -C A -N -n TestUser \
          127.0.0.1
strsclnt started at Mon Jun  6 22:50:39 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: SSL2 - 100 server certificates tested.
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Mon Jun  6 22:50:41 UTC 2016
ssl.sh: #1202: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 16798 at Mon Jun  6 22:50:41 UTC 2016
kill -USR1 16798
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16798 killed at Mon Jun  6 22:50:41 UTC 2016
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Mon Jun  6 22:50:41 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:50:41 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 16873 >/dev/null 2>/dev/null
selfserv with PID 16873 found at Mon Jun  6 22:50:41 UTC 2016
selfserv with PID 16873 started at Mon Jun  6 22:50:41 UTC 2016
strsclnt -q -p 8443 -d ../client -B -s -w nss -c 100 -C c -V :ssl3 -N -n TestUser \
          127.0.0.1
strsclnt started at Mon Jun  6 22:50:41 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Mon Jun  6 22:50:43 UTC 2016
ssl.sh: #1203: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 16873 at Mon Jun  6 22:50:43 UTC 2016
kill -USR1 16873
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16873 killed at Mon Jun  6 22:50:43 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Mon Jun  6 22:50:43 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:50:43 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 16948 >/dev/null 2>/dev/null
selfserv with PID 16948 found at Mon Jun  6 22:50:43 UTC 2016
selfserv with PID 16948 started at Mon Jun  6 22:50:43 UTC 2016
strsclnt -q -p 8443 -d ../client -B -s -w nss -c 100 -C c -N -n TestUser \
          127.0.0.1
strsclnt started at Mon Jun  6 22:50:43 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Mon Jun  6 22:50:45 UTC 2016
ssl.sh: #1204: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 16948 at Mon Jun  6 22:50:45 UTC 2016
kill -USR1 16948
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16948 killed at Mon Jun  6 22:50:45 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Mon Jun  6 22:50:45 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -u -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:50:45 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 17023 >/dev/null 2>/dev/null
selfserv with PID 17023 found at Mon Jun  6 22:50:45 UTC 2016
selfserv with PID 17023 started at Mon Jun  6 22:50:45 UTC 2016
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u \
          127.0.0.1
strsclnt started at Mon Jun  6 22:50:45 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Mon Jun  6 22:50:46 UTC 2016
ssl.sh: #1205: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 17023 at Mon Jun  6 22:50:46 UTC 2016
kill -USR1 17023
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17023 killed at Mon Jun  6 22:50:46 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Mon Jun  6 22:50:46 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:50:46 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 17099 >/dev/null 2>/dev/null
selfserv with PID 17099 found at Mon Jun  6 22:50:46 UTC 2016
selfserv with PID 17099 started at Mon Jun  6 22:50:46 UTC 2016
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z \
          127.0.0.1
strsclnt started at Mon Jun  6 22:50:46 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Mon Jun  6 22:50:47 UTC 2016
ssl.sh: #1206: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 17099 at Mon Jun  6 22:50:47 UTC 2016
kill -USR1 17099
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17099 killed at Mon Jun  6 22:50:47 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Mon Jun  6 22:50:47 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:50:47 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 17175 >/dev/null 2>/dev/null
selfserv with PID 17175 found at Mon Jun  6 22:50:47 UTC 2016
selfserv with PID 17175 started at Mon Jun  6 22:50:47 UTC 2016
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \
          127.0.0.1
strsclnt started at Mon Jun  6 22:50:47 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Mon Jun  6 22:50:48 UTC 2016
ssl.sh: #1207: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 17175 at Mon Jun  6 22:50:48 UTC 2016
kill -USR1 17175
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17175 killed at Mon Jun  6 22:50:48 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Mon Jun  6 22:50:48 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -u -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:50:48 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 17251 >/dev/null 2>/dev/null
selfserv with PID 17251 found at Mon Jun  6 22:50:48 UTC 2016
selfserv with PID 17251 started at Mon Jun  6 22:50:48 UTC 2016
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \
          127.0.0.1
strsclnt started at Mon Jun  6 22:50:48 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Mon Jun  6 22:50:49 UTC 2016
ssl.sh: #1208: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 17251 at Mon Jun  6 22:50:49 UTC 2016
kill -USR1 17251
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17251 killed at Mon Jun  6 22:50:49 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Mon Jun  6 22:50:50 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -u -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:50:50 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 17327 >/dev/null 2>/dev/null
selfserv with PID 17327 found at Mon Jun  6 22:50:50 UTC 2016
selfserv with PID 17327 started at Mon Jun  6 22:50:50 UTC 2016
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \
          127.0.0.1
strsclnt started at Mon Jun  6 22:50:50 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Mon Jun  6 22:50:50 UTC 2016
ssl.sh: #1209: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 17327 at Mon Jun  6 22:50:50 UTC 2016
kill -USR1 17327
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17327 killed at Mon Jun  6 22:50:50 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ----
selfserv starting at Mon Jun  6 22:50:51 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -u -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:50:51 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 17409 >/dev/null 2>/dev/null
selfserv with PID 17409 found at Mon Jun  6 22:50:51 UTC 2016
selfserv with PID 17409 started at Mon Jun  6 22:50:51 UTC 2016
strsclnt -q -p 8443 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \
          127.0.0.1
strsclnt started at Mon Jun  6 22:50:51 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Mon Jun  6 22:50:53 UTC 2016
ssl.sh: #1210: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 17409 at Mon Jun  6 22:50:53 UTC 2016
kill -USR1 17409
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17409 killed at Mon Jun  6 22:50:53 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ----
selfserv starting at Mon Jun  6 22:50:53 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -u -a testbuildd-sni.(none) -k testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:50:53 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 17491 >/dev/null 2>/dev/null
selfserv with PID 17491 found at Mon Jun  6 22:50:53 UTC 2016
selfserv with PID 17491 started at Mon Jun  6 22:50:53 UTC 2016
strsclnt -q -p 8443 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u -a testbuildd-sni.(none) \
          127.0.0.1
strsclnt started at Mon Jun  6 22:50:53 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Mon Jun  6 22:50:55 UTC 2016
ssl.sh: #1211: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 17491 at Mon Jun  6 22:50:55 UTC 2016
kill -USR1 17491
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17491 killed at Mon Jun  6 22:50:55 UTC 2016
ssl.sh: skipping  Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only)
ssl.sh: skipping  Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA (ECC only)
ssl.sh: skipping  Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) (ECC only)
ssl.sh: skipping  Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) (ECC only)
ssl.sh: skipping  Stress TLS  ECDHE-RSA   AES 128 CBC with SHA (ECC only)
ssl.sh: skipping  Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) (ECC only)
ssl.sh: skipping  Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only)
ssl.sh: skipping  Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only)
ssl.sh: skipping  Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only)
ssl.sh: skipping  Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only)
ssl.sh: skipping  Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only)
ssl.sh: skipping  Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only)
ssl.sh: SSL Cipher Coverage Extended Test - server normal/client bypass  ===============================
selfserv starting at Mon Jun  6 22:50:55 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:50:55 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 17644 >/dev/null 2>/dev/null
selfserv with PID 17644 found at Mon Jun  6 22:50:56 UTC 2016
selfserv with PID 17644 started at Mon Jun  6 22:50:56 UTC 2016
ssl.sh: skipping  SSL2_RC4_128_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 for Extended Test
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 17644 >/dev/null 2>/dev/null
selfserv with PID 17644 found at Mon Jun  6 22:50:56 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1212: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 17644 >/dev/null 2>/dev/null
selfserv with PID 17644 found at Mon Jun  6 22:50:56 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1213: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 17644 >/dev/null 2>/dev/null
selfserv with PID 17644 found at Mon Jun  6 22:50:57 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1214: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 17644 >/dev/null 2>/dev/null
selfserv with PID 17644 found at Mon Jun  6 22:50:57 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c f -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1215: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 17644 >/dev/null 2>/dev/null
selfserv with PID 17644 found at Mon Jun  6 22:50:57 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c g -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1216: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 17644 >/dev/null 2>/dev/null
selfserv with PID 17644 found at Mon Jun  6 22:50:57 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1217: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 17644 >/dev/null 2>/dev/null
selfserv with PID 17644 found at Mon Jun  6 22:50:57 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1218: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 17644 >/dev/null 2>/dev/null
selfserv with PID 17644 found at Mon Jun  6 22:50:58 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1219: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 17644 >/dev/null 2>/dev/null
selfserv with PID 17644 found at Mon Jun  6 22:50:58 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12229:
SSL peer was not expecting a handshake message it received.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: write to SSL socket failed: SSL received an unexpected Server Hello Done handshake message.
tstclnt: exiting with return code 254
ssl.sh: #1220: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 254, expected is 0 - FAILED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 17644 >/dev/null 2>/dev/null
selfserv with PID 17644 found at Mon Jun  6 22:50:58 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12229:
SSL peer was not expecting a handshake message it received.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: write to SSL socket failed: SSL received an unexpected Server Hello Done handshake message.
tstclnt: exiting with return code 254
ssl.sh: #1221: SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 254, expected is 0 - FAILED
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 17644 >/dev/null 2>/dev/null
selfserv with PID 17644 found at Mon Jun  6 22:50:58 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1222: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 17644 >/dev/null 2>/dev/null
selfserv with PID 17644 found at Mon Jun  6 22:50:58 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1223: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 17644 >/dev/null 2>/dev/null
selfserv with PID 17644 found at Mon Jun  6 22:50:59 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1224: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 17644 >/dev/null 2>/dev/null
selfserv with PID 17644 found at Mon Jun  6 22:50:59 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1225: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 17644 >/dev/null 2>/dev/null
selfserv with PID 17644 found at Mon Jun  6 22:50:59 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.0  -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1226: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 17644 >/dev/null 2>/dev/null
selfserv with PID 17644 found at Mon Jun  6 22:50:59 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.0  -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1227: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 17644 >/dev/null 2>/dev/null
selfserv with PID 17644 found at Mon Jun  6 22:50:59 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.0  -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1228: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 17644 >/dev/null 2>/dev/null
selfserv with PID 17644 found at Mon Jun  6 22:51:00 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c f -V ssl3:tls1.0  -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1229: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 17644 >/dev/null 2>/dev/null
selfserv with PID 17644 found at Mon Jun  6 22:51:00 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c g -V ssl3:tls1.0  -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1230: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 17644 >/dev/null 2>/dev/null
selfserv with PID 17644 found at Mon Jun  6 22:51:00 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.0  -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1231: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 17644 >/dev/null 2>/dev/null
selfserv with PID 17644 found at Mon Jun  6 22:51:00 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.0  -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1232: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 17644 >/dev/null 2>/dev/null
selfserv with PID 17644 found at Mon Jun  6 22:51:00 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.0  -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1233: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 17644 >/dev/null 2>/dev/null
selfserv with PID 17644 found at Mon Jun  6 22:51:01 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:tls1.0  -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12229:
SSL peer was not expecting a handshake message it received.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: write to SSL socket failed: SSL received an unexpected Server Hello Done handshake message.
tstclnt: exiting with return code 254
ssl.sh: #1234: TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 254, expected is 0 - FAILED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 17644 >/dev/null 2>/dev/null
selfserv with PID 17644 found at Mon Jun  6 22:51:01 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:tls1.0  -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12229:
SSL peer was not expecting a handshake message it received.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: write to SSL socket failed: SSL received an unexpected Server Hello Done handshake message.
tstclnt: exiting with return code 254
ssl.sh: #1235: TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 254, expected is 0 - FAILED
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 17644 >/dev/null 2>/dev/null
selfserv with PID 17644 found at Mon Jun  6 22:51:01 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.0  -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1236: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 17644 >/dev/null 2>/dev/null
selfserv with PID 17644 found at Mon Jun  6 22:51:01 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.0  -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1237: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 17644 >/dev/null 2>/dev/null
selfserv with PID 17644 found at Mon Jun  6 22:51:01 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.0  -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1238: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 17644 >/dev/null 2>/dev/null
selfserv with PID 17644 found at Mon Jun  6 22:51:02 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.0  -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1239: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 17644 >/dev/null 2>/dev/null
selfserv with PID 17644 found at Mon Jun  6 22:51:02 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1240: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 17644 >/dev/null 2>/dev/null
selfserv with PID 17644 found at Mon Jun  6 22:51:02 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1241: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 17644 >/dev/null 2>/dev/null
selfserv with PID 17644 found at Mon Jun  6 22:51:02 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1242: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 17644 >/dev/null 2>/dev/null
selfserv with PID 17644 found at Mon Jun  6 22:51:03 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1243: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 17644 >/dev/null 2>/dev/null
selfserv with PID 17644 found at Mon Jun  6 22:51:03 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1244: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 17644 >/dev/null 2>/dev/null
selfserv with PID 17644 found at Mon Jun  6 22:51:03 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1245: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 17644 >/dev/null 2>/dev/null
selfserv with PID 17644 found at Mon Jun  6 22:51:03 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12229:
SSL peer was not expecting a handshake message it received.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: write to SSL socket failed: SSL received an unexpected Server Hello Done handshake message.
tstclnt: exiting with return code 254
ssl.sh: #1246: TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 254, expected is 0 - FAILED
ssl.sh: running TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 17644 >/dev/null 2>/dev/null
selfserv with PID 17644 found at Mon Jun  6 22:51:03 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12229:
SSL peer was not expecting a handshake message it received.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: write to SSL socket failed: SSL received an unexpected Server Hello Done handshake message.
tstclnt: exiting with return code 254
ssl.sh: #1247: TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 254, expected is 0 - FAILED
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 17644 >/dev/null 2>/dev/null
selfserv with PID 17644 found at Mon Jun  6 22:51:04 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1248: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 17644 >/dev/null 2>/dev/null
selfserv with PID 17644 found at Mon Jun  6 22:51:04 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1249: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 17644 >/dev/null 2>/dev/null
selfserv with PID 17644 found at Mon Jun  6 22:51:04 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1250: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 17644 >/dev/null 2>/dev/null
selfserv with PID 17644 found at Mon Jun  6 22:51:04 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1251: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only)
trying to kill selfserv with PID 17644 at Mon Jun  6 22:51:06 UTC 2016
kill -USR1 17644
selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17644 killed at Mon Jun  6 22:51:06 UTC 2016
ssl.sh: SSL Client Authentication Extended Test - server normal/client bypass  ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:51:06 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:51:06 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 19154 >/dev/null 2>/dev/null
selfserv with PID 19154 found at Mon Jun  6 22:51:06 UTC 2016
selfserv with PID 19154 started at Mon Jun  6 22:51:06 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1252: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19154 at Mon Jun  6 22:51:07 UTC 2016
kill -USR1 19154
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19154 killed at Mon Jun  6 22:51:07 UTC 2016
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Mon Jun  6 22:51:07 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:51:07 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 19211 >/dev/null 2>/dev/null
selfserv with PID 19211 found at Mon Jun  6 22:51:07 UTC 2016
selfserv with PID 19211 started at Mon Jun  6 22:51:07 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1253: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19211 at Mon Jun  6 22:51:08 UTC 2016
kill -USR1 19211
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19211 killed at Mon Jun  6 22:51:08 UTC 2016
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Mon Jun  6 22:51:08 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:51:08 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 19268 >/dev/null 2>/dev/null
selfserv with PID 19268 found at Mon Jun  6 22:51:08 UTC 2016
selfserv with PID 19268 started at Mon Jun  6 22:51:08 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1254: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19268 at Mon Jun  6 22:51:09 UTC 2016
kill -USR1 19268
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19268 killed at Mon Jun  6 22:51:09 UTC 2016
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:51:09 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:51:09 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 19325 >/dev/null 2>/dev/null
selfserv with PID 19325 found at Mon Jun  6 22:51:09 UTC 2016
selfserv with PID 19325 started at Mon Jun  6 22:51:09 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1255: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19325 at Mon Jun  6 22:51:09 UTC 2016
kill -USR1 19325
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19325 killed at Mon Jun  6 22:51:10 UTC 2016
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Mon Jun  6 22:51:10 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:51:10 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 19382 >/dev/null 2>/dev/null
selfserv with PID 19382 found at Mon Jun  6 22:51:10 UTC 2016
selfserv with PID 19382 started at Mon Jun  6 22:51:10 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1256: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19382 at Mon Jun  6 22:51:10 UTC 2016
kill -USR1 19382
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19382 killed at Mon Jun  6 22:51:10 UTC 2016
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Mon Jun  6 22:51:10 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:51:10 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 19439 >/dev/null 2>/dev/null
selfserv with PID 19439 found at Mon Jun  6 22:51:11 UTC 2016
selfserv with PID 19439 started at Mon Jun  6 22:51:11 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -w nss -n ExtendedSSLUser   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1257: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19439 at Mon Jun  6 22:51:11 UTC 2016
kill -USR1 19439
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19439 killed at Mon Jun  6 22:51:11 UTC 2016
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:51:11 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:51:11 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 19496 >/dev/null 2>/dev/null
selfserv with PID 19496 found at Mon Jun  6 22:51:11 UTC 2016
selfserv with PID 19496 started at Mon Jun  6 22:51:11 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V :ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1258: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19496 at Mon Jun  6 22:51:12 UTC 2016
kill -USR1 19496
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19496 killed at Mon Jun  6 22:51:12 UTC 2016
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Mon Jun  6 22:51:12 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:51:12 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 19553 >/dev/null 2>/dev/null
selfserv with PID 19553 found at Mon Jun  6 22:51:12 UTC 2016
selfserv with PID 19553 started at Mon Jun  6 22:51:12 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser -w bogus  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1259: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19553 at Mon Jun  6 22:51:13 UTC 2016
kill -USR1 19553
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19553 killed at Mon Jun  6 22:51:13 UTC 2016
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Mon Jun  6 22:51:13 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:51:13 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 19610 >/dev/null 2>/dev/null
selfserv with PID 19610 found at Mon Jun  6 22:51:13 UTC 2016
selfserv with PID 19610 started at Mon Jun  6 22:51:13 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1260: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19610 at Mon Jun  6 22:51:14 UTC 2016
kill -USR1 19610
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19610 killed at Mon Jun  6 22:51:14 UTC 2016
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:51:14 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:51:14 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 19667 >/dev/null 2>/dev/null
selfserv with PID 19667 found at Mon Jun  6 22:51:14 UTC 2016
selfserv with PID 19667 started at Mon Jun  6 22:51:14 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V :ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1261: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19667 at Mon Jun  6 22:51:15 UTC 2016
kill -USR1 19667
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19667 killed at Mon Jun  6 22:51:15 UTC 2016
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Mon Jun  6 22:51:15 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:51:15 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 19724 >/dev/null 2>/dev/null
selfserv with PID 19724 found at Mon Jun  6 22:51:15 UTC 2016
selfserv with PID 19724 started at Mon Jun  6 22:51:15 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser -w bogus  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1262: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19724 at Mon Jun  6 22:51:15 UTC 2016
kill -USR1 19724
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19724 killed at Mon Jun  6 22:51:15 UTC 2016
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Mon Jun  6 22:51:16 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:51:16 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 19781 >/dev/null 2>/dev/null
selfserv with PID 19781 found at Mon Jun  6 22:51:16 UTC 2016
selfserv with PID 19781 started at Mon Jun  6 22:51:16 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1263: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19781 at Mon Jun  6 22:51:16 UTC 2016
kill -USR1 19781
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19781 killed at Mon Jun  6 22:51:16 UTC 2016
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:51:16 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:51:16 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 19838 >/dev/null 2>/dev/null
selfserv with PID 19838 found at Mon Jun  6 22:51:17 UTC 2016
selfserv with PID 19838 started at Mon Jun  6 22:51:17 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3: -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1264: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19838 at Mon Jun  6 22:51:17 UTC 2016
kill -USR1 19838
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19838 killed at Mon Jun  6 22:51:17 UTC 2016
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:51:17 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:51:17 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 19895 >/dev/null 2>/dev/null
selfserv with PID 19895 found at Mon Jun  6 22:51:17 UTC 2016
selfserv with PID 19895 started at Mon Jun  6 22:51:17 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3: -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1265: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19895 at Mon Jun  6 22:51:18 UTC 2016
kill -USR1 19895
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19895 killed at Mon Jun  6 22:51:18 UTC 2016
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:51:18 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:51:18 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 19952 >/dev/null 2>/dev/null
selfserv with PID 19952 found at Mon Jun  6 22:51:18 UTC 2016
selfserv with PID 19952 started at Mon Jun  6 22:51:18 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3: -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1266: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19952 at Mon Jun  6 22:51:19 UTC 2016
kill -USR1 19952
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19952 killed at Mon Jun  6 22:51:19 UTC 2016
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:51:19 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:51:19 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 20009 >/dev/null 2>/dev/null
selfserv with PID 20009 found at Mon Jun  6 22:51:19 UTC 2016
selfserv with PID 20009 started at Mon Jun  6 22:51:19 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3: -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1267: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 20009 at Mon Jun  6 22:51:20 UTC 2016
kill -USR1 20009
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20009 killed at Mon Jun  6 22:51:20 UTC 2016
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:51:20 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:51:20 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 20066 >/dev/null 2>/dev/null
selfserv with PID 20066 found at Mon Jun  6 22:51:20 UTC 2016
selfserv with PID 20066 started at Mon Jun  6 22:51:20 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3: -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1268: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 20066 at Mon Jun  6 22:51:21 UTC 2016
kill -USR1 20066
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20066 killed at Mon Jun  6 22:51:21 UTC 2016
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:51:21 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:51:21 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 20123 >/dev/null 2>/dev/null
selfserv with PID 20123 found at Mon Jun  6 22:51:21 UTC 2016
selfserv with PID 20123 started at Mon Jun  6 22:51:21 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3: -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1269: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20123 at Mon Jun  6 22:51:21 UTC 2016
kill -USR1 20123
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20123 killed at Mon Jun  6 22:51:22 UTC 2016
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:51:22 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:51:22 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 20180 >/dev/null 2>/dev/null
selfserv with PID 20180 found at Mon Jun  6 22:51:22 UTC 2016
selfserv with PID 20180 started at Mon Jun  6 22:51:22 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1270: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20180 at Mon Jun  6 22:51:22 UTC 2016
kill -USR1 20180
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20180 killed at Mon Jun  6 22:51:22 UTC 2016
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:51:22 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:51:22 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 20237 >/dev/null 2>/dev/null
selfserv with PID 20237 found at Mon Jun  6 22:51:23 UTC 2016
selfserv with PID 20237 started at Mon Jun  6 22:51:23 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1271: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20237 at Mon Jun  6 22:51:23 UTC 2016
kill -USR1 20237
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20237 killed at Mon Jun  6 22:51:23 UTC 2016
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:51:23 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:51:23 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 20294 >/dev/null 2>/dev/null
selfserv with PID 20294 found at Mon Jun  6 22:51:23 UTC 2016
selfserv with PID 20294 started at Mon Jun  6 22:51:23 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1272: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20294 at Mon Jun  6 22:51:24 UTC 2016
kill -USR1 20294
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20294 killed at Mon Jun  6 22:51:24 UTC 2016
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:51:24 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:51:24 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 20351 >/dev/null 2>/dev/null
selfserv with PID 20351 found at Mon Jun  6 22:51:24 UTC 2016
selfserv with PID 20351 started at Mon Jun  6 22:51:24 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1273: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 20351 at Mon Jun  6 22:51:25 UTC 2016
kill -USR1 20351
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20351 killed at Mon Jun  6 22:51:25 UTC 2016
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:51:25 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:51:25 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 20408 >/dev/null 2>/dev/null
selfserv with PID 20408 found at Mon Jun  6 22:51:25 UTC 2016
selfserv with PID 20408 started at Mon Jun  6 22:51:25 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1274: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 20408 at Mon Jun  6 22:51:26 UTC 2016
kill -USR1 20408
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20408 killed at Mon Jun  6 22:51:26 UTC 2016
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:51:26 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:51:26 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 20465 >/dev/null 2>/dev/null
selfserv with PID 20465 found at Mon Jun  6 22:51:26 UTC 2016
selfserv with PID 20465 started at Mon Jun  6 22:51:26 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1275: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20465 at Mon Jun  6 22:51:27 UTC 2016
kill -USR1 20465
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20465 killed at Mon Jun  6 22:51:27 UTC 2016
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:51:27 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:51:27 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 20522 >/dev/null 2>/dev/null
selfserv with PID 20522 found at Mon Jun  6 22:51:27 UTC 2016
selfserv with PID 20522 started at Mon Jun  6 22:51:27 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1276: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20522 at Mon Jun  6 22:51:27 UTC 2016
kill -USR1 20522
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20522 killed at Mon Jun  6 22:51:27 UTC 2016
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:51:28 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:51:28 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 20579 >/dev/null 2>/dev/null
selfserv with PID 20579 found at Mon Jun  6 22:51:28 UTC 2016
selfserv with PID 20579 started at Mon Jun  6 22:51:28 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1277: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20579 at Mon Jun  6 22:51:28 UTC 2016
kill -USR1 20579
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20579 killed at Mon Jun  6 22:51:28 UTC 2016
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:51:28 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:51:28 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 20636 >/dev/null 2>/dev/null
selfserv with PID 20636 found at Mon Jun  6 22:51:29 UTC 2016
selfserv with PID 20636 started at Mon Jun  6 22:51:29 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1278: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20636 at Mon Jun  6 22:51:29 UTC 2016
kill -USR1 20636
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20636 killed at Mon Jun  6 22:51:29 UTC 2016
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:51:29 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:51:29 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 20693 >/dev/null 2>/dev/null
selfserv with PID 20693 found at Mon Jun  6 22:51:29 UTC 2016
selfserv with PID 20693 started at Mon Jun  6 22:51:29 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1279: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 20693 at Mon Jun  6 22:51:30 UTC 2016
kill -USR1 20693
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20693 killed at Mon Jun  6 22:51:30 UTC 2016
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:51:30 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:51:30 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 20750 >/dev/null 2>/dev/null
selfserv with PID 20750 found at Mon Jun  6 22:51:30 UTC 2016
selfserv with PID 20750 started at Mon Jun  6 22:51:30 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1280: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 20750 at Mon Jun  6 22:51:31 UTC 2016
kill -USR1 20750
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20750 killed at Mon Jun  6 22:51:31 UTC 2016
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:51:31 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:51:31 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 20807 >/dev/null 2>/dev/null
selfserv with PID 20807 found at Mon Jun  6 22:51:31 UTC 2016
selfserv with PID 20807 started at Mon Jun  6 22:51:31 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1281: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20807 at Mon Jun  6 22:51:32 UTC 2016
kill -USR1 20807
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20807 killed at Mon Jun  6 22:51:32 UTC 2016
ssl.sh: skipping  TLS Request don't require client auth (EC) (bad password) (ECC only)
ssl.sh: skipping  TLS Request don't require client auth (EC) (client auth) (ECC only)
ssl.sh: skipping  TLS Require client auth (EC) (bad password) (ECC only)
ssl.sh: skipping  TLS Require client auth (EC) (client auth) (ECC only)
ssl.sh: skipping  SSL3 Request don't require client auth (EC) (bad password) (ECC only)
ssl.sh: skipping  SSL3 Request don't require client auth (EC) (client auth) (ECC only)
ssl.sh: skipping  SSL3 Require client auth (EC) (bad password) (ECC only)
ssl.sh: skipping  SSL3 Require client auth (EC) (client auth) (ECC only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping  TLS Require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping  TLS Require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping  TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping  TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping  SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping  SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
ssl.sh: skipping  SSL3 Server hello response without SNI for Extended Test
ssl.sh: skipping  SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name on 2d HS for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
ssl.sh: SSL Stress Test Extended Test - server normal/client bypass  ===============================
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Mon Jun  6 22:51:33 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss   -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:51:33 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 21033 >/dev/null 2>/dev/null
selfserv with PID 21033 found at Mon Jun  6 22:51:33 UTC 2016
selfserv with PID 21033 started at Mon Jun  6 22:51:33 UTC 2016
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -c 1000 -C c -V :ssl3 \
          127.0.0.1
strsclnt started at Mon Jun  6 22:51:33 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Mon Jun  6 22:51:34 UTC 2016
ssl.sh: #1282: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21033 at Mon Jun  6 22:51:34 UTC 2016
kill -USR1 21033
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21033 killed at Mon Jun  6 22:51:34 UTC 2016
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Mon Jun  6 22:51:35 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss   -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:51:35 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 21109 >/dev/null 2>/dev/null
selfserv with PID 21109 found at Mon Jun  6 22:51:35 UTC 2016
selfserv with PID 21109 started at Mon Jun  6 22:51:35 UTC 2016
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -c 1000 -C c \
          127.0.0.1
strsclnt started at Mon Jun  6 22:51:35 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Mon Jun  6 22:51:36 UTC 2016
ssl.sh: #1283: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21109 at Mon Jun  6 22:51:36 UTC 2016
kill -USR1 21109
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21109 killed at Mon Jun  6 22:51:36 UTC 2016
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Mon Jun  6 22:51:37 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss   -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:51:37 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 21185 >/dev/null 2>/dev/null
selfserv with PID 21185 found at Mon Jun  6 22:51:37 UTC 2016
selfserv with PID 21185 started at Mon Jun  6 22:51:37 UTC 2016
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -c 1000 -C c -g \
          127.0.0.1
strsclnt started at Mon Jun  6 22:51:37 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Mon Jun  6 22:51:38 UTC 2016
ssl.sh: #1284: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21185 at Mon Jun  6 22:51:38 UTC 2016
kill -USR1 21185
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21185 killed at Mon Jun  6 22:51:38 UTC 2016
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Mon Jun  6 22:51:39 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -u -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:51:39 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 21261 >/dev/null 2>/dev/null
selfserv with PID 21261 found at Mon Jun  6 22:51:39 UTC 2016
selfserv with PID 21261 started at Mon Jun  6 22:51:39 UTC 2016
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u \
          127.0.0.1
strsclnt started at Mon Jun  6 22:51:39 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Mon Jun  6 22:51:40 UTC 2016
ssl.sh: #1285: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21261 at Mon Jun  6 22:51:40 UTC 2016
kill -USR1 21261
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21261 killed at Mon Jun  6 22:51:40 UTC 2016
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Mon Jun  6 22:51:40 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:51:40 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 21337 >/dev/null 2>/dev/null
selfserv with PID 21337 found at Mon Jun  6 22:51:41 UTC 2016
selfserv with PID 21337 started at Mon Jun  6 22:51:41 UTC 2016
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -z \
          127.0.0.1
strsclnt started at Mon Jun  6 22:51:41 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Mon Jun  6 22:51:43 UTC 2016
ssl.sh: #1286: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21337 at Mon Jun  6 22:51:43 UTC 2016
kill -USR1 21337
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21337 killed at Mon Jun  6 22:51:43 UTC 2016
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Mon Jun  6 22:51:43 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -u -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:51:43 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 21413 >/dev/null 2>/dev/null
selfserv with PID 21413 found at Mon Jun  6 22:51:43 UTC 2016
selfserv with PID 21413 started at Mon Jun  6 22:51:43 UTC 2016
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \
          127.0.0.1
strsclnt started at Mon Jun  6 22:51:43 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Mon Jun  6 22:51:45 UTC 2016
ssl.sh: #1287: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21413 at Mon Jun  6 22:51:45 UTC 2016
kill -USR1 21413
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21413 killed at Mon Jun  6 22:51:45 UTC 2016
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Mon Jun  6 22:51:45 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -u -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:51:45 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 21489 >/dev/null 2>/dev/null
selfserv with PID 21489 found at Mon Jun  6 22:51:45 UTC 2016
selfserv with PID 21489 started at Mon Jun  6 22:51:45 UTC 2016
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \
          127.0.0.1
strsclnt started at Mon Jun  6 22:51:45 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Mon Jun  6 22:51:47 UTC 2016
ssl.sh: #1288: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21489 at Mon Jun  6 22:51:48 UTC 2016
kill -USR1 21489
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21489 killed at Mon Jun  6 22:51:48 UTC 2016
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Mon Jun  6 22:51:48 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:51:48 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 21594 >/dev/null 2>/dev/null
selfserv with PID 21594 found at Mon Jun  6 22:51:48 UTC 2016
selfserv with PID 21594 started at Mon Jun  6 22:51:48 UTC 2016
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \
          127.0.0.1
strsclnt started at Mon Jun  6 22:51:48 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Mon Jun  6 22:51:50 UTC 2016
ssl.sh: #1289: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21594 at Mon Jun  6 22:51:50 UTC 2016
kill -USR1 21594
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21594 killed at Mon Jun  6 22:51:50 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Mon Jun  6 22:51:50 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:51:50 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 21669 >/dev/null 2>/dev/null
selfserv with PID 21669 found at Mon Jun  6 22:51:50 UTC 2016
selfserv with PID 21669 started at Mon Jun  6 22:51:50 UTC 2016
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -c 100 -C c -N -n ExtendedSSLUser \
          127.0.0.1
strsclnt started at Mon Jun  6 22:51:50 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Mon Jun  6 22:51:52 UTC 2016
ssl.sh: #1290: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21669 at Mon Jun  6 22:51:52 UTC 2016
kill -USR1 21669
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21669 killed at Mon Jun  6 22:51:52 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Mon Jun  6 22:51:52 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -u -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:51:53 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 21744 >/dev/null 2>/dev/null
selfserv with PID 21744 found at Mon Jun  6 22:51:53 UTC 2016
selfserv with PID 21744 started at Mon Jun  6 22:51:53 UTC 2016
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \
          127.0.0.1
strsclnt started at Mon Jun  6 22:51:53 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Mon Jun  6 22:51:53 UTC 2016
ssl.sh: #1291: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21744 at Mon Jun  6 22:51:53 UTC 2016
kill -USR1 21744
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21744 killed at Mon Jun  6 22:51:53 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Mon Jun  6 22:51:54 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:51:54 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 21820 >/dev/null 2>/dev/null
selfserv with PID 21820 found at Mon Jun  6 22:51:54 UTC 2016
selfserv with PID 21820 started at Mon Jun  6 22:51:54 UTC 2016
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \
          127.0.0.1
strsclnt started at Mon Jun  6 22:51:54 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Mon Jun  6 22:51:54 UTC 2016
ssl.sh: #1292: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21820 at Mon Jun  6 22:51:55 UTC 2016
kill -USR1 21820
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21820 killed at Mon Jun  6 22:51:55 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Mon Jun  6 22:51:55 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:51:55 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 21896 >/dev/null 2>/dev/null
selfserv with PID 21896 found at Mon Jun  6 22:51:55 UTC 2016
selfserv with PID 21896 started at Mon Jun  6 22:51:55 UTC 2016
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \
          127.0.0.1
strsclnt started at Mon Jun  6 22:51:55 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Mon Jun  6 22:51:56 UTC 2016
ssl.sh: #1293: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21896 at Mon Jun  6 22:51:56 UTC 2016
kill -USR1 21896
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21896 killed at Mon Jun  6 22:51:56 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Mon Jun  6 22:51:56 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -u -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:51:56 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 21972 >/dev/null 2>/dev/null
selfserv with PID 21972 found at Mon Jun  6 22:51:56 UTC 2016
selfserv with PID 21972 started at Mon Jun  6 22:51:56 UTC 2016
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \
          127.0.0.1
strsclnt started at Mon Jun  6 22:51:56 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Mon Jun  6 22:51:57 UTC 2016
ssl.sh: #1294: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21972 at Mon Jun  6 22:51:57 UTC 2016
kill -USR1 21972
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21972 killed at Mon Jun  6 22:51:57 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Mon Jun  6 22:51:57 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -u -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:51:57 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 22048 >/dev/null 2>/dev/null
selfserv with PID 22048 found at Mon Jun  6 22:51:57 UTC 2016
selfserv with PID 22048 started at Mon Jun  6 22:51:57 UTC 2016
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \
          127.0.0.1
strsclnt started at Mon Jun  6 22:51:57 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Mon Jun  6 22:51:58 UTC 2016
ssl.sh: #1295: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 22048 at Mon Jun  6 22:51:58 UTC 2016
kill -USR1 22048
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22048 killed at Mon Jun  6 22:51:58 UTC 2016
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test
ssl.sh: skipping  Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only)
ssl.sh: skipping  Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA (ECC only)
ssl.sh: skipping  Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) (ECC only)
ssl.sh: skipping  Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) (ECC only)
ssl.sh: skipping  Stress TLS  ECDHE-RSA   AES 128 CBC with SHA (ECC only)
ssl.sh: skipping  Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) (ECC only)
ssl.sh: skipping  Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only)
ssl.sh: skipping  Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only)
ssl.sh: skipping  Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only)
ssl.sh: skipping  Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only)
ssl.sh: skipping  Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only)
ssl.sh: skipping  Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only)
ssl.sh: SSL - FIPS mode on for server ===============================
ssl.sh: Turning FIPS on for the  server
modutil -dbdir /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/server -fips true -force
security library: invalid arguments.
ERROR: Unable to switch FIPS modes.
ssl.sh: #1296:  (modutil -fips true) produced a returncode of 11, expected is 0 - FAILED
modutil -dbdir /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/server -list
ssl.sh: #1297:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: #1298:  (grep "FIPS PKCS #11") produced a returncode of 1, expected is 0 - FAILED
ssl.sh: Turning FIPS on for the extended  server
modutil -dbdir /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ext_server -fips true -force
security library: invalid arguments.
ERROR: Unable to switch FIPS modes.
ssl.sh: #1299:  (modutil -fips true) produced a returncode of 11, expected is 0 - FAILED
modutil -dbdir /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ext_server -list
ssl.sh: #1300:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: #1301:  (grep "FIPS PKCS #11") produced a returncode of 1, expected is 0 - FAILED
ssl.sh: SSL Cipher Coverage  - server fips/client normal  ===============================
selfserv starting at Mon Jun  6 22:51:59 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:51:59 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 22277 >/dev/null 2>/dev/null
selfserv with PID 22277 found at Mon Jun  6 22:51:59 UTC 2016
selfserv with PID 22277 started at Mon Jun  6 22:51:59 UTC 2016
ssl.sh: skipping  SSL2_RC4_128_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_DES_192_EDE3_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 22277 >/dev/null 2>/dev/null
selfserv with PID 22277 found at Mon Jun  6 22:52:00 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1302: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22277 >/dev/null 2>/dev/null
selfserv with PID 22277 found at Mon Jun  6 22:52:00 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1303: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 22277 >/dev/null 2>/dev/null
selfserv with PID 22277 found at Mon Jun  6 22:52:00 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1304: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 22277 >/dev/null 2>/dev/null
selfserv with PID 22277 found at Mon Jun  6 22:52:01 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1305: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22277 >/dev/null 2>/dev/null
selfserv with PID 22277 found at Mon Jun  6 22:52:01 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1306: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 22277 >/dev/null 2>/dev/null
selfserv with PID 22277 found at Mon Jun  6 22:52:01 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1307: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 22277 >/dev/null 2>/dev/null
selfserv with PID 22277 found at Mon Jun  6 22:52:01 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1308: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22277 >/dev/null 2>/dev/null
selfserv with PID 22277 found at Mon Jun  6 22:52:01 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1309: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22277 >/dev/null 2>/dev/null
selfserv with PID 22277 found at Mon Jun  6 22:52:02 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1310: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 22277 >/dev/null 2>/dev/null
selfserv with PID 22277 found at Mon Jun  6 22:52:02 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1311: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 22277 >/dev/null 2>/dev/null
selfserv with PID 22277 found at Mon Jun  6 22:52:02 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.0   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1312: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22277 >/dev/null 2>/dev/null
selfserv with PID 22277 found at Mon Jun  6 22:52:02 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.0   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1313: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 22277 >/dev/null 2>/dev/null
selfserv with PID 22277 found at Mon Jun  6 22:52:02 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.0   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1314: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 22277 >/dev/null 2>/dev/null
selfserv with PID 22277 found at Mon Jun  6 22:52:03 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.0   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1315: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22277 >/dev/null 2>/dev/null
selfserv with PID 22277 found at Mon Jun  6 22:52:03 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.0   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1316: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 22277 >/dev/null 2>/dev/null
selfserv with PID 22277 found at Mon Jun  6 22:52:03 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.0   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1317: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 22277 >/dev/null 2>/dev/null
selfserv with PID 22277 found at Mon Jun  6 22:52:03 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.0   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1318: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22277 >/dev/null 2>/dev/null
selfserv with PID 22277 found at Mon Jun  6 22:52:04 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.0   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1319: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22277 >/dev/null 2>/dev/null
selfserv with PID 22277 found at Mon Jun  6 22:52:04 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.0   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1320: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 22277 >/dev/null 2>/dev/null
selfserv with PID 22277 found at Mon Jun  6 22:52:04 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.0   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1321: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 22277 >/dev/null 2>/dev/null
selfserv with PID 22277 found at Mon Jun  6 22:52:04 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1322: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22277 >/dev/null 2>/dev/null
selfserv with PID 22277 found at Mon Jun  6 22:52:04 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1323: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 22277 >/dev/null 2>/dev/null
selfserv with PID 22277 found at Mon Jun  6 22:52:05 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1324: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  f    TLS11_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  g    TLS11_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 22277 >/dev/null 2>/dev/null
selfserv with PID 22277 found at Mon Jun  6 22:52:05 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1325: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22277 >/dev/null 2>/dev/null
selfserv with PID 22277 found at Mon Jun  6 22:52:05 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1326: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 22277 >/dev/null 2>/dev/null
selfserv with PID 22277 found at Mon Jun  6 22:52:05 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1327: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 22277 >/dev/null 2>/dev/null
selfserv with PID 22277 found at Mon Jun  6 22:52:06 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1328: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22277 >/dev/null 2>/dev/null
selfserv with PID 22277 found at Mon Jun  6 22:52:06 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1329: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22277 >/dev/null 2>/dev/null
selfserv with PID 22277 found at Mon Jun  6 22:52:06 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1330: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 22277 >/dev/null 2>/dev/null
selfserv with PID 22277 found at Mon Jun  6 22:52:06 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1331: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only)
trying to kill selfserv with PID 22277 at Mon Jun  6 22:52:08 UTC 2016
kill -USR1 22277
selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22277 killed at Mon Jun  6 22:52:08 UTC 2016
ssl.sh: SSL Client Authentication  - server fips/client normal  ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:52:08 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:08 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 23589 >/dev/null 2>/dev/null
selfserv with PID 23589 found at Mon Jun  6 22:52:08 UTC 2016
selfserv with PID 23589 started at Mon Jun  6 22:52:08 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1332: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23589 at Mon Jun  6 22:52:09 UTC 2016
kill -USR1 23589
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23589 killed at Mon Jun  6 22:52:09 UTC 2016
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Mon Jun  6 22:52:09 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:09 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 23647 >/dev/null 2>/dev/null
selfserv with PID 23647 found at Mon Jun  6 22:52:09 UTC 2016
selfserv with PID 23647 started at Mon Jun  6 22:52:09 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -w bogus -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1333: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23647 at Mon Jun  6 22:52:10 UTC 2016
kill -USR1 23647
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23647 killed at Mon Jun  6 22:52:10 UTC 2016
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Mon Jun  6 22:52:10 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:10 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 23704 >/dev/null 2>/dev/null
selfserv with PID 23704 found at Mon Jun  6 22:52:10 UTC 2016
selfserv with PID 23704 started at Mon Jun  6 22:52:10 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -w nss -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1334: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23704 at Mon Jun  6 22:52:11 UTC 2016
kill -USR1 23704
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23704 killed at Mon Jun  6 22:52:11 UTC 2016
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:52:11 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:11 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 23761 >/dev/null 2>/dev/null
selfserv with PID 23761 found at Mon Jun  6 22:52:11 UTC 2016
selfserv with PID 23761 started at Mon Jun  6 22:52:11 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1335: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23761 at Mon Jun  6 22:52:11 UTC 2016
kill -USR1 23761
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23761 killed at Mon Jun  6 22:52:11 UTC 2016
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Mon Jun  6 22:52:12 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:12 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 23818 >/dev/null 2>/dev/null
selfserv with PID 23818 found at Mon Jun  6 22:52:12 UTC 2016
selfserv with PID 23818 started at Mon Jun  6 22:52:12 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -w bogus -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1336: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23818 at Mon Jun  6 22:52:12 UTC 2016
kill -USR1 23818
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23818 killed at Mon Jun  6 22:52:12 UTC 2016
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Mon Jun  6 22:52:12 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:12 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 23875 >/dev/null 2>/dev/null
selfserv with PID 23875 found at Mon Jun  6 22:52:12 UTC 2016
selfserv with PID 23875 started at Mon Jun  6 22:52:12 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -w nss -n TestUser   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1337: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23875 at Mon Jun  6 22:52:13 UTC 2016
kill -USR1 23875
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23875 killed at Mon Jun  6 22:52:13 UTC 2016
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:52:13 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:13 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 23932 >/dev/null 2>/dev/null
selfserv with PID 23932 found at Mon Jun  6 22:52:13 UTC 2016
selfserv with PID 23932 started at Mon Jun  6 22:52:13 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V :ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1338: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23932 at Mon Jun  6 22:52:14 UTC 2016
kill -USR1 23932
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23932 killed at Mon Jun  6 22:52:14 UTC 2016
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Mon Jun  6 22:52:14 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:14 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 23989 >/dev/null 2>/dev/null
selfserv with PID 23989 found at Mon Jun  6 22:52:14 UTC 2016
selfserv with PID 23989 started at Mon Jun  6 22:52:14 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V :ssl3 -n TestUser -w bogus  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1339: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23989 at Mon Jun  6 22:52:15 UTC 2016
kill -USR1 23989
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23989 killed at Mon Jun  6 22:52:15 UTC 2016
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Mon Jun  6 22:52:15 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:15 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 24046 >/dev/null 2>/dev/null
selfserv with PID 24046 found at Mon Jun  6 22:52:15 UTC 2016
selfserv with PID 24046 started at Mon Jun  6 22:52:15 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V :ssl3 -n TestUser -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1340: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24046 at Mon Jun  6 22:52:15 UTC 2016
kill -USR1 24046
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24046 killed at Mon Jun  6 22:52:16 UTC 2016
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:52:16 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:16 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 24103 >/dev/null 2>/dev/null
selfserv with PID 24103 found at Mon Jun  6 22:52:16 UTC 2016
selfserv with PID 24103 started at Mon Jun  6 22:52:16 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V :ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1341: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24103 at Mon Jun  6 22:52:16 UTC 2016
kill -USR1 24103
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24103 killed at Mon Jun  6 22:52:16 UTC 2016
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Mon Jun  6 22:52:16 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:16 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 24160 >/dev/null 2>/dev/null
selfserv with PID 24160 found at Mon Jun  6 22:52:17 UTC 2016
selfserv with PID 24160 started at Mon Jun  6 22:52:17 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V :ssl3 -n TestUser -w bogus  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1342: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24160 at Mon Jun  6 22:52:17 UTC 2016
kill -USR1 24160
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24160 killed at Mon Jun  6 22:52:17 UTC 2016
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Mon Jun  6 22:52:17 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:17 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 24217 >/dev/null 2>/dev/null
selfserv with PID 24217 found at Mon Jun  6 22:52:17 UTC 2016
selfserv with PID 24217 started at Mon Jun  6 22:52:17 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V :ssl3 -n TestUser -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1343: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24217 at Mon Jun  6 22:52:18 UTC 2016
kill -USR1 24217
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24217 killed at Mon Jun  6 22:52:18 UTC 2016
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:52:18 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:18 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 24274 >/dev/null 2>/dev/null
selfserv with PID 24274 found at Mon Jun  6 22:52:18 UTC 2016
selfserv with PID 24274 started at Mon Jun  6 22:52:18 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3: -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1344: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24274 at Mon Jun  6 22:52:19 UTC 2016
kill -USR1 24274
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24274 killed at Mon Jun  6 22:52:19 UTC 2016
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:52:19 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:19 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 24332 >/dev/null 2>/dev/null
selfserv with PID 24332 found at Mon Jun  6 22:52:19 UTC 2016
selfserv with PID 24332 started at Mon Jun  6 22:52:19 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3: -w bogus -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1345: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24332 at Mon Jun  6 22:52:20 UTC 2016
kill -USR1 24332
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24332 killed at Mon Jun  6 22:52:20 UTC 2016
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:52:20 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:20 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 24389 >/dev/null 2>/dev/null
selfserv with PID 24389 found at Mon Jun  6 22:52:20 UTC 2016
selfserv with PID 24389 started at Mon Jun  6 22:52:20 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1346: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24389 at Mon Jun  6 22:52:21 UTC 2016
kill -USR1 24389
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24389 killed at Mon Jun  6 22:52:21 UTC 2016
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:52:21 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:21 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 24446 >/dev/null 2>/dev/null
selfserv with PID 24446 found at Mon Jun  6 22:52:21 UTC 2016
selfserv with PID 24446 started at Mon Jun  6 22:52:21 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3: -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1347: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24446 at Mon Jun  6 22:52:21 UTC 2016
kill -USR1 24446
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24446 killed at Mon Jun  6 22:52:21 UTC 2016
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:52:22 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:22 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 24503 >/dev/null 2>/dev/null
selfserv with PID 24503 found at Mon Jun  6 22:52:22 UTC 2016
selfserv with PID 24503 started at Mon Jun  6 22:52:22 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3: -w bogus -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1348: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24503 at Mon Jun  6 22:52:22 UTC 2016
kill -USR1 24503
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24503 killed at Mon Jun  6 22:52:22 UTC 2016
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:52:22 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:22 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 24560 >/dev/null 2>/dev/null
selfserv with PID 24560 found at Mon Jun  6 22:52:22 UTC 2016
selfserv with PID 24560 started at Mon Jun  6 22:52:22 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1349: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24560 at Mon Jun  6 22:52:23 UTC 2016
kill -USR1 24560
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24560 killed at Mon Jun  6 22:52:23 UTC 2016
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:52:23 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:23 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 24617 >/dev/null 2>/dev/null
selfserv with PID 24617 found at Mon Jun  6 22:52:23 UTC 2016
selfserv with PID 24617 started at Mon Jun  6 22:52:23 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1350: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24617 at Mon Jun  6 22:52:24 UTC 2016
kill -USR1 24617
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24617 killed at Mon Jun  6 22:52:24 UTC 2016
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:52:24 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:24 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 24674 >/dev/null 2>/dev/null
selfserv with PID 24674 found at Mon Jun  6 22:52:24 UTC 2016
selfserv with PID 24674 started at Mon Jun  6 22:52:24 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1351: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24674 at Mon Jun  6 22:52:25 UTC 2016
kill -USR1 24674
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24674 killed at Mon Jun  6 22:52:25 UTC 2016
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:52:25 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:25 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 24732 >/dev/null 2>/dev/null
selfserv with PID 24732 found at Mon Jun  6 22:52:25 UTC 2016
selfserv with PID 24732 started at Mon Jun  6 22:52:25 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1352: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24732 at Mon Jun  6 22:52:26 UTC 2016
kill -USR1 24732
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24732 killed at Mon Jun  6 22:52:26 UTC 2016
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:52:26 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:26 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 24789 >/dev/null 2>/dev/null
selfserv with PID 24789 found at Mon Jun  6 22:52:26 UTC 2016
selfserv with PID 24789 started at Mon Jun  6 22:52:26 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1353: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24789 at Mon Jun  6 22:52:27 UTC 2016
kill -USR1 24789
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24789 killed at Mon Jun  6 22:52:27 UTC 2016
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:52:27 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:27 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 24846 >/dev/null 2>/dev/null
selfserv with PID 24846 found at Mon Jun  6 22:52:27 UTC 2016
selfserv with PID 24846 started at Mon Jun  6 22:52:27 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1354: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24846 at Mon Jun  6 22:52:27 UTC 2016
kill -USR1 24846
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24846 killed at Mon Jun  6 22:52:27 UTC 2016
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:52:27 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:27 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 24903 >/dev/null 2>/dev/null
selfserv with PID 24903 found at Mon Jun  6 22:52:28 UTC 2016
selfserv with PID 24903 started at Mon Jun  6 22:52:28 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1355: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24903 at Mon Jun  6 22:52:28 UTC 2016
kill -USR1 24903
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24903 killed at Mon Jun  6 22:52:28 UTC 2016
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:52:28 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:28 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 24960 >/dev/null 2>/dev/null
selfserv with PID 24960 found at Mon Jun  6 22:52:28 UTC 2016
selfserv with PID 24960 started at Mon Jun  6 22:52:28 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1356: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24960 at Mon Jun  6 22:52:29 UTC 2016
kill -USR1 24960
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24960 killed at Mon Jun  6 22:52:29 UTC 2016
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:52:29 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:29 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 25017 >/dev/null 2>/dev/null
selfserv with PID 25017 found at Mon Jun  6 22:52:29 UTC 2016
selfserv with PID 25017 started at Mon Jun  6 22:52:29 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w bogus  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1357: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25017 at Mon Jun  6 22:52:30 UTC 2016
kill -USR1 25017
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25017 killed at Mon Jun  6 22:52:30 UTC 2016
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:52:30 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:30 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 25076 >/dev/null 2>/dev/null
selfserv with PID 25076 found at Mon Jun  6 22:52:30 UTC 2016
selfserv with PID 25076 started at Mon Jun  6 22:52:30 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1358: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25076 at Mon Jun  6 22:52:31 UTC 2016
kill -USR1 25076
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25076 killed at Mon Jun  6 22:52:31 UTC 2016
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:52:31 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:31 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 25133 >/dev/null 2>/dev/null
selfserv with PID 25133 found at Mon Jun  6 22:52:31 UTC 2016
selfserv with PID 25133 started at Mon Jun  6 22:52:31 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1359: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25133 at Mon Jun  6 22:52:32 UTC 2016
kill -USR1 25133
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25133 killed at Mon Jun  6 22:52:32 UTC 2016
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:52:32 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:32 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 25191 >/dev/null 2>/dev/null
selfserv with PID 25191 found at Mon Jun  6 22:52:32 UTC 2016
selfserv with PID 25191 started at Mon Jun  6 22:52:32 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w bogus  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1360: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25191 at Mon Jun  6 22:52:32 UTC 2016
kill -USR1 25191
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25191 killed at Mon Jun  6 22:52:32 UTC 2016
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:52:33 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:33 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 25248 >/dev/null 2>/dev/null
selfserv with PID 25248 found at Mon Jun  6 22:52:33 UTC 2016
selfserv with PID 25248 started at Mon Jun  6 22:52:33 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1361: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25248 at Mon Jun  6 22:52:33 UTC 2016
kill -USR1 25248
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25248 killed at Mon Jun  6 22:52:33 UTC 2016
ssl.sh: skipping  TLS Request don't require client auth (EC) (bad password) (ECC only)
ssl.sh: skipping  TLS Request don't require client auth (EC) (client auth) (ECC only)
ssl.sh: skipping  TLS Require client auth (EC) (bad password) (ECC only)
ssl.sh: skipping  TLS Require client auth (EC) (client auth) (ECC only)
ssl.sh: skipping  SSL3 Request don't require client auth (EC) (bad password) (ECC only)
ssl.sh: skipping  SSL3 Request don't require client auth (EC) (client auth) (ECC only)
ssl.sh: skipping  SSL3 Require client auth (EC) (bad password) (ECC only)
ssl.sh: skipping  SSL3 Require client auth (EC) (client auth) (ECC only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping  TLS Require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping  TLS Require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping  TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping  TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping  SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping  SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Mon Jun  6 22:52:34 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:34 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 25381 >/dev/null 2>/dev/null
selfserv with PID 25381 found at Mon Jun  6 22:52:34 UTC 2016
selfserv with PID 25381 started at Mon Jun  6 22:52:34 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1362: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25381 at Mon Jun  6 22:52:34 UTC 2016
kill -USR1 25381
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25381 killed at Mon Jun  6 22:52:34 UTC 2016
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Mon Jun  6 22:52:35 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:35 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 25444 >/dev/null 2>/dev/null
selfserv with PID 25444 found at Mon Jun  6 22:52:35 UTC 2016
selfserv with PID 25444 started at Mon Jun  6 22:52:35 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a testbuildd-sni.(none)  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=testbuildd-sni.(none),E=testbuildd-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1363: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25444 at Mon Jun  6 22:52:35 UTC 2016
kill -USR1 25444
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25444 killed at Mon Jun  6 22:52:35 UTC 2016
ssl.sh: TLS Server response with alert ----
selfserv starting at Mon Jun  6 22:52:36 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:36 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 25507 >/dev/null 2>/dev/null
selfserv with PID 25507 found at Mon Jun  6 22:52:36 UTC 2016
selfserv with PID 25507 started at Mon Jun  6 22:52:36 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a testbuildd-sni1.(none)  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #1364: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25507 at Mon Jun  6 22:52:36 UTC 2016
kill -USR1 25507
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25507 killed at Mon Jun  6 22:52:36 UTC 2016
ssl.sh: SSL3 Server hello response without SNI ----
selfserv starting at Mon Jun  6 22:52:36 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:36 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 25570 >/dev/null 2>/dev/null
selfserv with PID 25570 found at Mon Jun  6 22:52:37 UTC 2016
selfserv with PID 25570 started at Mon Jun  6 22:52:37 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1365: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25570 at Mon Jun  6 22:52:37 UTC 2016
kill -USR1 25570
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25570 killed at Mon Jun  6 22:52:37 UTC 2016
ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ----
selfserv starting at Mon Jun  6 22:52:37 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:37 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 25633 >/dev/null 2>/dev/null
selfserv with PID 25633 found at Mon Jun  6 22:52:37 UTC 2016
selfserv with PID 25633 started at Mon Jun  6 22:52:37 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n TestUser -a testbuildd-sni.(none)  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: authentication of server cert failed: Unable to communicate securely with peer: requested domain name does not match the server's certificate.
tstclnt: exiting with return code 254
ssl.sh: #1366: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25633 at Mon Jun  6 22:52:38 UTC 2016
kill -USR1 25633
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25633 killed at Mon Jun  6 22:52:38 UTC 2016
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Mon Jun  6 22:52:38 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:38 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 25696 >/dev/null 2>/dev/null
selfserv with PID 25696 found at Mon Jun  6 22:52:38 UTC 2016
selfserv with PID 25696 started at Mon Jun  6 22:52:38 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1367: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25696 at Mon Jun  6 22:52:39 UTC 2016
kill -USR1 25696
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25696 killed at Mon Jun  6 22:52:39 UTC 2016
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Mon Jun  6 22:52:39 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:39 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 25759 >/dev/null 2>/dev/null
selfserv with PID 25759 found at Mon Jun  6 22:52:39 UTC 2016
selfserv with PID 25759 started at Mon Jun  6 22:52:39 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a testbuildd-sni.(none)  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=testbuildd-sni.(none),E=testbuildd-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=testbuildd-sni.(none),E=testbuildd-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1368: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25759 at Mon Jun  6 22:52:40 UTC 2016
kill -USR1 25759
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25759 killed at Mon Jun  6 22:52:40 UTC 2016
ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ----
selfserv starting at Mon Jun  6 22:52:40 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:40 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 25822 >/dev/null 2>/dev/null
selfserv with PID 25822 found at Mon Jun  6 22:52:40 UTC 2016
selfserv with PID 25822 started at Mon Jun  6 22:52:40 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a testbuildd-sni.(none) -a testbuildd.(none)  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=testbuildd-sni.(none),E=testbuildd-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 1
ssl.sh: #1369: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25822 at Mon Jun  6 22:52:41 UTC 2016
kill -USR1 25822
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25822 killed at Mon Jun  6 22:52:41 UTC 2016
ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ----
selfserv starting at Mon Jun  6 22:52:41 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:41 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 25885 >/dev/null 2>/dev/null
selfserv with PID 25885 found at Mon Jun  6 22:52:41 UTC 2016
selfserv with PID 25885 started at Mon Jun  6 22:52:41 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a testbuildd-sni.(none) -a testbuildd-sni1.(none)  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=testbuildd-sni.(none),E=testbuildd-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 1
ssl.sh: #1370: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25885 at Mon Jun  6 22:52:41 UTC 2016
kill -USR1 25885
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25885 killed at Mon Jun  6 22:52:42 UTC 2016
ssl.sh: TLS Server response with alert ----
selfserv starting at Mon Jun  6 22:52:42 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:42 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 25948 >/dev/null 2>/dev/null
selfserv with PID 25948 found at Mon Jun  6 22:52:42 UTC 2016
selfserv with PID 25948 started at Mon Jun  6 22:52:42 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a testbuildd-sni1.(none)  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #1371: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25948 at Mon Jun  6 22:52:42 UTC 2016
kill -USR1 25948
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25948 killed at Mon Jun  6 22:52:42 UTC 2016
ssl.sh: SSL Stress Test  - server fips/client normal  ===============================
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 (non-FIPS only)
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Mon Jun  6 22:52:43 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss   -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:43 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 26084 >/dev/null 2>/dev/null
selfserv with PID 26084 found at Mon Jun  6 22:52:43 UTC 2016
selfserv with PID 26084 started at Mon Jun  6 22:52:43 UTC 2016
strsclnt -q -p 8443 -d ../client  -w nss -c 1000 -C c -V :ssl3 \
          127.0.0.1
strsclnt started at Mon Jun  6 22:52:43 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Mon Jun  6 22:52:45 UTC 2016
ssl.sh: #1372: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26084 at Mon Jun  6 22:52:45 UTC 2016
kill -USR1 26084
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26084 killed at Mon Jun  6 22:52:45 UTC 2016
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Mon Jun  6 22:52:45 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss   -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:45 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 26162 >/dev/null 2>/dev/null
selfserv with PID 26162 found at Mon Jun  6 22:52:45 UTC 2016
selfserv with PID 26162 started at Mon Jun  6 22:52:45 UTC 2016
strsclnt -q -p 8443 -d ../client  -w nss -c 1000 -C c \
          127.0.0.1
strsclnt started at Mon Jun  6 22:52:45 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Mon Jun  6 22:52:47 UTC 2016
ssl.sh: #1373: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26162 at Mon Jun  6 22:52:47 UTC 2016
kill -USR1 26162
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26162 killed at Mon Jun  6 22:52:47 UTC 2016
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Mon Jun  6 22:52:47 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss   -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:47 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 26239 >/dev/null 2>/dev/null
selfserv with PID 26239 found at Mon Jun  6 22:52:47 UTC 2016
selfserv with PID 26239 started at Mon Jun  6 22:52:47 UTC 2016
strsclnt -q -p 8443 -d ../client  -w nss -c 1000 -C c -g \
          127.0.0.1
strsclnt started at Mon Jun  6 22:52:47 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Mon Jun  6 22:52:49 UTC 2016
ssl.sh: #1374: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26239 at Mon Jun  6 22:52:49 UTC 2016
kill -USR1 26239
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26239 killed at Mon Jun  6 22:52:49 UTC 2016
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Mon Jun  6 22:52:49 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -u -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:49 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 26315 >/dev/null 2>/dev/null
selfserv with PID 26315 found at Mon Jun  6 22:52:49 UTC 2016
selfserv with PID 26315 started at Mon Jun  6 22:52:49 UTC 2016
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3: -c 1000 -C c -u \
          127.0.0.1
strsclnt started at Mon Jun  6 22:52:49 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Mon Jun  6 22:52:51 UTC 2016
ssl.sh: #1375: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26315 at Mon Jun  6 22:52:51 UTC 2016
kill -USR1 26315
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26315 killed at Mon Jun  6 22:52:51 UTC 2016
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Mon Jun  6 22:52:52 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:52 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 26391 >/dev/null 2>/dev/null
selfserv with PID 26391 found at Mon Jun  6 22:52:52 UTC 2016
selfserv with PID 26391 started at Mon Jun  6 22:52:52 UTC 2016
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3: -c 1000 -C c -z \
          127.0.0.1
strsclnt started at Mon Jun  6 22:52:52 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Mon Jun  6 22:52:54 UTC 2016
ssl.sh: #1376: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26391 at Mon Jun  6 22:52:54 UTC 2016
kill -USR1 26391
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26391 killed at Mon Jun  6 22:52:54 UTC 2016
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Mon Jun  6 22:52:54 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -u -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:54 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 26467 >/dev/null 2>/dev/null
selfserv with PID 26467 found at Mon Jun  6 22:52:54 UTC 2016
selfserv with PID 26467 started at Mon Jun  6 22:52:54 UTC 2016
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3: -c 1000 -C c -u -z \
          127.0.0.1
strsclnt started at Mon Jun  6 22:52:54 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Mon Jun  6 22:52:56 UTC 2016
ssl.sh: #1377: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26467 at Mon Jun  6 22:52:57 UTC 2016
kill -USR1 26467
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26467 killed at Mon Jun  6 22:52:57 UTC 2016
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Mon Jun  6 22:52:57 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -u -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:57 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 26543 >/dev/null 2>/dev/null
selfserv with PID 26543 found at Mon Jun  6 22:52:57 UTC 2016
selfserv with PID 26543 started at Mon Jun  6 22:52:57 UTC 2016
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3: -c 1000 -C c -u -z -g \
          127.0.0.1
strsclnt started at Mon Jun  6 22:52:57 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Mon Jun  6 22:52:59 UTC 2016
ssl.sh: #1378: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26543 at Mon Jun  6 22:52:59 UTC 2016
kill -USR1 26543
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26543 killed at Mon Jun  6 22:52:59 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ----
selfserv starting at Mon Jun  6 22:52:59 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -u -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:52:59 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 26625 >/dev/null 2>/dev/null
selfserv with PID 26625 found at Mon Jun  6 22:52:59 UTC 2016
selfserv with PID 26625 started at Mon Jun  6 22:53:00 UTC 2016
strsclnt -q -p 8443 -d ../client  -w nss -V tls1.0: -c 1000 -C c -u \
          127.0.0.1
strsclnt started at Mon Jun  6 22:53:00 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Mon Jun  6 22:53:02 UTC 2016
ssl.sh: #1379: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26625 at Mon Jun  6 22:53:02 UTC 2016
kill -USR1 26625
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26625 killed at Mon Jun  6 22:53:02 UTC 2016
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 (no reuse, client auth) (non-FIPS only)
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Mon Jun  6 22:53:02 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:53:02 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 26730 >/dev/null 2>/dev/null
selfserv with PID 26730 found at Mon Jun  6 22:53:02 UTC 2016
selfserv with PID 26730 started at Mon Jun  6 22:53:02 UTC 2016
strsclnt -q -p 8443 -d ../client  -w nss -c 100 -C c -V :ssl3 -N -n TestUser \
          127.0.0.1
strsclnt started at Mon Jun  6 22:53:02 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Mon Jun  6 22:53:04 UTC 2016
ssl.sh: #1380: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26730 at Mon Jun  6 22:53:04 UTC 2016
kill -USR1 26730
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26730 killed at Mon Jun  6 22:53:04 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Mon Jun  6 22:53:04 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:53:04 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 26817 >/dev/null 2>/dev/null
selfserv with PID 26817 found at Mon Jun  6 22:53:04 UTC 2016
selfserv with PID 26817 started at Mon Jun  6 22:53:04 UTC 2016
strsclnt -q -p 8443 -d ../client  -w nss -c 100 -C c -N -n TestUser \
          127.0.0.1
strsclnt started at Mon Jun  6 22:53:04 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Mon Jun  6 22:53:06 UTC 2016
ssl.sh: #1381: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26817 at Mon Jun  6 22:53:06 UTC 2016
kill -USR1 26817
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26817 killed at Mon Jun  6 22:53:06 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Mon Jun  6 22:53:06 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -u -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:53:06 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 26892 >/dev/null 2>/dev/null
selfserv with PID 26892 found at Mon Jun  6 22:53:06 UTC 2016
selfserv with PID 26892 started at Mon Jun  6 22:53:06 UTC 2016
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -u \
          127.0.0.1
strsclnt started at Mon Jun  6 22:53:06 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Mon Jun  6 22:53:07 UTC 2016
ssl.sh: #1382: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26892 at Mon Jun  6 22:53:07 UTC 2016
kill -USR1 26892
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26892 killed at Mon Jun  6 22:53:07 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Mon Jun  6 22:53:07 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:53:07 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 26968 >/dev/null 2>/dev/null
selfserv with PID 26968 found at Mon Jun  6 22:53:07 UTC 2016
selfserv with PID 26968 started at Mon Jun  6 22:53:07 UTC 2016
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -z \
          127.0.0.1
strsclnt started at Mon Jun  6 22:53:07 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Mon Jun  6 22:53:08 UTC 2016
ssl.sh: #1383: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26968 at Mon Jun  6 22:53:08 UTC 2016
kill -USR1 26968
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26968 killed at Mon Jun  6 22:53:08 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Mon Jun  6 22:53:08 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:53:08 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 27044 >/dev/null 2>/dev/null
selfserv with PID 27044 found at Mon Jun  6 22:53:08 UTC 2016
selfserv with PID 27044 started at Mon Jun  6 22:53:08 UTC 2016
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \
          127.0.0.1
strsclnt started at Mon Jun  6 22:53:08 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Mon Jun  6 22:53:09 UTC 2016
ssl.sh: #1384: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27044 at Mon Jun  6 22:53:09 UTC 2016
kill -USR1 27044
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27044 killed at Mon Jun  6 22:53:09 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Mon Jun  6 22:53:09 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -u -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:53:09 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 27120 >/dev/null 2>/dev/null
selfserv with PID 27120 found at Mon Jun  6 22:53:09 UTC 2016
selfserv with PID 27120 started at Mon Jun  6 22:53:09 UTC 2016
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \
          127.0.0.1
strsclnt started at Mon Jun  6 22:53:09 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Mon Jun  6 22:53:10 UTC 2016
ssl.sh: #1385: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27120 at Mon Jun  6 22:53:10 UTC 2016
kill -USR1 27120
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27120 killed at Mon Jun  6 22:53:10 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Mon Jun  6 22:53:10 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -u -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:53:10 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 27196 >/dev/null 2>/dev/null
selfserv with PID 27196 found at Mon Jun  6 22:53:10 UTC 2016
selfserv with PID 27196 started at Mon Jun  6 22:53:10 UTC 2016
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \
          127.0.0.1
strsclnt started at Mon Jun  6 22:53:10 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Mon Jun  6 22:53:11 UTC 2016
ssl.sh: #1386: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27196 at Mon Jun  6 22:53:11 UTC 2016
kill -USR1 27196
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27196 killed at Mon Jun  6 22:53:11 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ----
selfserv starting at Mon Jun  6 22:53:11 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -u -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:53:11 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 27278 >/dev/null 2>/dev/null
selfserv with PID 27278 found at Mon Jun  6 22:53:11 UTC 2016
selfserv with PID 27278 started at Mon Jun  6 22:53:11 UTC 2016
strsclnt -q -p 8443 -d ../client  -w nss -V tls1.0: -c 1000 -C c -u \
          127.0.0.1
strsclnt started at Mon Jun  6 22:53:11 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Mon Jun  6 22:53:13 UTC 2016
ssl.sh: #1387: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27278 at Mon Jun  6 22:53:14 UTC 2016
kill -USR1 27278
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27278 killed at Mon Jun  6 22:53:14 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ----
selfserv starting at Mon Jun  6 22:53:14 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -u -a testbuildd-sni.(none) -k testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:53:14 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 27360 >/dev/null 2>/dev/null
selfserv with PID 27360 found at Mon Jun  6 22:53:14 UTC 2016
selfserv with PID 27360 started at Mon Jun  6 22:53:14 UTC 2016
strsclnt -q -p 8443 -d ../client  -w nss -V tls1.0: -c 1000 -C c -u -a testbuildd-sni.(none) \
          127.0.0.1
strsclnt started at Mon Jun  6 22:53:14 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Mon Jun  6 22:53:16 UTC 2016
ssl.sh: #1388: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27360 at Mon Jun  6 22:53:16 UTC 2016
kill -USR1 27360
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27360 killed at Mon Jun  6 22:53:16 UTC 2016
ssl.sh: skipping  Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only)
ssl.sh: skipping  Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA (ECC only)
ssl.sh: skipping  Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) (ECC only)
ssl.sh: skipping  Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) (ECC only)
ssl.sh: skipping  Stress TLS  ECDHE-RSA   AES 128 CBC with SHA (ECC only)
ssl.sh: skipping  Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) (ECC only)
ssl.sh: skipping  Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only)
ssl.sh: skipping  Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only)
ssl.sh: skipping  Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only)
ssl.sh: skipping  Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only)
ssl.sh: skipping  Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only)
ssl.sh: skipping  Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only)
ssl.sh: SSL Cipher Coverage Extended Test - server fips/client normal  ===============================
selfserv starting at Mon Jun  6 22:53:17 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:53:17 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 27513 >/dev/null 2>/dev/null
selfserv with PID 27513 found at Mon Jun  6 22:53:17 UTC 2016
selfserv with PID 27513 started at Mon Jun  6 22:53:17 UTC 2016
ssl.sh: skipping  SSL2_RC4_128_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 for Extended Test
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 27513 >/dev/null 2>/dev/null
selfserv with PID 27513 found at Mon Jun  6 22:53:17 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1389: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 27513 >/dev/null 2>/dev/null
selfserv with PID 27513 found at Mon Jun  6 22:53:18 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1390: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 27513 >/dev/null 2>/dev/null
selfserv with PID 27513 found at Mon Jun  6 22:53:18 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1391: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 27513 >/dev/null 2>/dev/null
selfserv with PID 27513 found at Mon Jun  6 22:53:18 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1392: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 27513 >/dev/null 2>/dev/null
selfserv with PID 27513 found at Mon Jun  6 22:53:18 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1393: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 27513 >/dev/null 2>/dev/null
selfserv with PID 27513 found at Mon Jun  6 22:53:18 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1394: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 27513 >/dev/null 2>/dev/null
selfserv with PID 27513 found at Mon Jun  6 22:53:19 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1395: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 27513 >/dev/null 2>/dev/null
selfserv with PID 27513 found at Mon Jun  6 22:53:19 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1396: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 27513 >/dev/null 2>/dev/null
selfserv with PID 27513 found at Mon Jun  6 22:53:19 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1397: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 27513 >/dev/null 2>/dev/null
selfserv with PID 27513 found at Mon Jun  6 22:53:19 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1398: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 27513 >/dev/null 2>/dev/null
selfserv with PID 27513 found at Mon Jun  6 22:53:20 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.0   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1399: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 27513 >/dev/null 2>/dev/null
selfserv with PID 27513 found at Mon Jun  6 22:53:20 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.0   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1400: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 27513 >/dev/null 2>/dev/null
selfserv with PID 27513 found at Mon Jun  6 22:53:20 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.0   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1401: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 27513 >/dev/null 2>/dev/null
selfserv with PID 27513 found at Mon Jun  6 22:53:20 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.0   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1402: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 27513 >/dev/null 2>/dev/null
selfserv with PID 27513 found at Mon Jun  6 22:53:20 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.0   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1403: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 27513 >/dev/null 2>/dev/null
selfserv with PID 27513 found at Mon Jun  6 22:53:21 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.0   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1404: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 27513 >/dev/null 2>/dev/null
selfserv with PID 27513 found at Mon Jun  6 22:53:21 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.0   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1405: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 27513 >/dev/null 2>/dev/null
selfserv with PID 27513 found at Mon Jun  6 22:53:21 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.0   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1406: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 27513 >/dev/null 2>/dev/null
selfserv with PID 27513 found at Mon Jun  6 22:53:21 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.0   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1407: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 27513 >/dev/null 2>/dev/null
selfserv with PID 27513 found at Mon Jun  6 22:53:21 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.0   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1408: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 27513 >/dev/null 2>/dev/null
selfserv with PID 27513 found at Mon Jun  6 22:53:22 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1409: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 27513 >/dev/null 2>/dev/null
selfserv with PID 27513 found at Mon Jun  6 22:53:22 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1410: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 27513 >/dev/null 2>/dev/null
selfserv with PID 27513 found at Mon Jun  6 22:53:22 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1411: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  f    TLS11_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  g    TLS11_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 27513 >/dev/null 2>/dev/null
selfserv with PID 27513 found at Mon Jun  6 22:53:23 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1412: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 27513 >/dev/null 2>/dev/null
selfserv with PID 27513 found at Mon Jun  6 22:53:23 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1413: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 27513 >/dev/null 2>/dev/null
selfserv with PID 27513 found at Mon Jun  6 22:53:23 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1414: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 27513 >/dev/null 2>/dev/null
selfserv with PID 27513 found at Mon Jun  6 22:53:23 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1415: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 27513 >/dev/null 2>/dev/null
selfserv with PID 27513 found at Mon Jun  6 22:53:23 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1416: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 27513 >/dev/null 2>/dev/null
selfserv with PID 27513 found at Mon Jun  6 22:53:24 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1417: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 27513 >/dev/null 2>/dev/null
selfserv with PID 27513 found at Mon Jun  6 22:53:24 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1418: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only)
trying to kill selfserv with PID 27513 at Mon Jun  6 22:53:25 UTC 2016
kill -USR1 27513
selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27513 killed at Mon Jun  6 22:53:25 UTC 2016
ssl.sh: SSL Client Authentication Extended Test - server fips/client normal  ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:53:26 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:53:26 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 28827 >/dev/null 2>/dev/null
selfserv with PID 28827 found at Mon Jun  6 22:53:26 UTC 2016
selfserv with PID 28827 started at Mon Jun  6 22:53:26 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1419: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28827 at Mon Jun  6 22:53:27 UTC 2016
kill -USR1 28827
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28827 killed at Mon Jun  6 22:53:27 UTC 2016
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Mon Jun  6 22:53:27 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:53:27 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 28884 >/dev/null 2>/dev/null
selfserv with PID 28884 found at Mon Jun  6 22:53:27 UTC 2016
selfserv with PID 28884 started at Mon Jun  6 22:53:27 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1420: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28884 at Mon Jun  6 22:53:27 UTC 2016
kill -USR1 28884
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28884 killed at Mon Jun  6 22:53:27 UTC 2016
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Mon Jun  6 22:53:28 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:53:28 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 28941 >/dev/null 2>/dev/null
selfserv with PID 28941 found at Mon Jun  6 22:53:28 UTC 2016
selfserv with PID 28941 started at Mon Jun  6 22:53:28 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1421: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28941 at Mon Jun  6 22:53:28 UTC 2016
kill -USR1 28941
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28941 killed at Mon Jun  6 22:53:28 UTC 2016
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:53:28 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:53:28 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 28998 >/dev/null 2>/dev/null
selfserv with PID 28998 found at Mon Jun  6 22:53:28 UTC 2016
selfserv with PID 28998 started at Mon Jun  6 22:53:28 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1422: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28998 at Mon Jun  6 22:53:29 UTC 2016
kill -USR1 28998
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28998 killed at Mon Jun  6 22:53:29 UTC 2016
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Mon Jun  6 22:53:29 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:53:29 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 29055 >/dev/null 2>/dev/null
selfserv with PID 29055 found at Mon Jun  6 22:53:29 UTC 2016
selfserv with PID 29055 started at Mon Jun  6 22:53:29 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1423: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29055 at Mon Jun  6 22:53:30 UTC 2016
kill -USR1 29055
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29055 killed at Mon Jun  6 22:53:30 UTC 2016
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Mon Jun  6 22:53:30 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:53:30 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 29112 >/dev/null 2>/dev/null
selfserv with PID 29112 found at Mon Jun  6 22:53:30 UTC 2016
selfserv with PID 29112 started at Mon Jun  6 22:53:30 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -w nss -n ExtendedSSLUser   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1424: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29112 at Mon Jun  6 22:53:31 UTC 2016
kill -USR1 29112
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29112 killed at Mon Jun  6 22:53:31 UTC 2016
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:53:31 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:53:31 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 29169 >/dev/null 2>/dev/null
selfserv with PID 29169 found at Mon Jun  6 22:53:31 UTC 2016
selfserv with PID 29169 started at Mon Jun  6 22:53:31 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V :ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1425: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29169 at Mon Jun  6 22:53:32 UTC 2016
kill -USR1 29169
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29169 killed at Mon Jun  6 22:53:32 UTC 2016
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Mon Jun  6 22:53:32 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:53:32 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 29226 >/dev/null 2>/dev/null
selfserv with PID 29226 found at Mon Jun  6 22:53:32 UTC 2016
selfserv with PID 29226 started at Mon Jun  6 22:53:32 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser -w bogus  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1426: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29226 at Mon Jun  6 22:53:33 UTC 2016
kill -USR1 29226
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29226 killed at Mon Jun  6 22:53:33 UTC 2016
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Mon Jun  6 22:53:33 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:53:33 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 29283 >/dev/null 2>/dev/null
selfserv with PID 29283 found at Mon Jun  6 22:53:33 UTC 2016
selfserv with PID 29283 started at Mon Jun  6 22:53:33 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1427: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29283 at Mon Jun  6 22:53:33 UTC 2016
kill -USR1 29283
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29283 killed at Mon Jun  6 22:53:34 UTC 2016
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:53:34 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:53:34 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 29340 >/dev/null 2>/dev/null
selfserv with PID 29340 found at Mon Jun  6 22:53:34 UTC 2016
selfserv with PID 29340 started at Mon Jun  6 22:53:34 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V :ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1428: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29340 at Mon Jun  6 22:53:34 UTC 2016
kill -USR1 29340
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29340 killed at Mon Jun  6 22:53:34 UTC 2016
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Mon Jun  6 22:53:34 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:53:34 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 29397 >/dev/null 2>/dev/null
selfserv with PID 29397 found at Mon Jun  6 22:53:35 UTC 2016
selfserv with PID 29397 started at Mon Jun  6 22:53:35 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser -w bogus  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1429: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29397 at Mon Jun  6 22:53:35 UTC 2016
kill -USR1 29397
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29397 killed at Mon Jun  6 22:53:35 UTC 2016
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Mon Jun  6 22:53:35 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:53:35 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 29454 >/dev/null 2>/dev/null
selfserv with PID 29454 found at Mon Jun  6 22:53:35 UTC 2016
selfserv with PID 29454 started at Mon Jun  6 22:53:35 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1430: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29454 at Mon Jun  6 22:53:36 UTC 2016
kill -USR1 29454
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29454 killed at Mon Jun  6 22:53:36 UTC 2016
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:53:36 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:53:36 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 29511 >/dev/null 2>/dev/null
selfserv with PID 29511 found at Mon Jun  6 22:53:36 UTC 2016
selfserv with PID 29511 started at Mon Jun  6 22:53:36 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3: -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1431: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29511 at Mon Jun  6 22:53:37 UTC 2016
kill -USR1 29511
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29511 killed at Mon Jun  6 22:53:37 UTC 2016
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:53:37 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:53:37 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 29568 >/dev/null 2>/dev/null
selfserv with PID 29568 found at Mon Jun  6 22:53:37 UTC 2016
selfserv with PID 29568 started at Mon Jun  6 22:53:37 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3: -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1432: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29568 at Mon Jun  6 22:53:38 UTC 2016
kill -USR1 29568
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29568 killed at Mon Jun  6 22:53:38 UTC 2016
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:53:38 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:53:38 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 29625 >/dev/null 2>/dev/null
selfserv with PID 29625 found at Mon Jun  6 22:53:38 UTC 2016
selfserv with PID 29625 started at Mon Jun  6 22:53:38 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3: -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1433: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29625 at Mon Jun  6 22:53:39 UTC 2016
kill -USR1 29625
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29625 killed at Mon Jun  6 22:53:39 UTC 2016
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:53:39 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:53:39 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 29682 >/dev/null 2>/dev/null
selfserv with PID 29682 found at Mon Jun  6 22:53:39 UTC 2016
selfserv with PID 29682 started at Mon Jun  6 22:53:39 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3: -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1434: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29682 at Mon Jun  6 22:53:40 UTC 2016
kill -USR1 29682
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29682 killed at Mon Jun  6 22:53:40 UTC 2016
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:53:40 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:53:40 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 29739 >/dev/null 2>/dev/null
selfserv with PID 29739 found at Mon Jun  6 22:53:40 UTC 2016
selfserv with PID 29739 started at Mon Jun  6 22:53:40 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3: -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1435: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29739 at Mon Jun  6 22:53:40 UTC 2016
kill -USR1 29739
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29739 killed at Mon Jun  6 22:53:40 UTC 2016
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:53:40 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:53:41 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 29796 >/dev/null 2>/dev/null
selfserv with PID 29796 found at Mon Jun  6 22:53:41 UTC 2016
selfserv with PID 29796 started at Mon Jun  6 22:53:41 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3: -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1436: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29796 at Mon Jun  6 22:53:41 UTC 2016
kill -USR1 29796
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29796 killed at Mon Jun  6 22:53:41 UTC 2016
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:53:41 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:53:41 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 29853 >/dev/null 2>/dev/null
selfserv with PID 29853 found at Mon Jun  6 22:53:41 UTC 2016
selfserv with PID 29853 started at Mon Jun  6 22:53:41 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1437: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29853 at Mon Jun  6 22:53:42 UTC 2016
kill -USR1 29853
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29853 killed at Mon Jun  6 22:53:42 UTC 2016
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:53:42 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:53:42 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 29910 >/dev/null 2>/dev/null
selfserv with PID 29910 found at Mon Jun  6 22:53:42 UTC 2016
selfserv with PID 29910 started at Mon Jun  6 22:53:42 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1438: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29910 at Mon Jun  6 22:53:43 UTC 2016
kill -USR1 29910
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29910 killed at Mon Jun  6 22:53:43 UTC 2016
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:53:43 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:53:43 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 29967 >/dev/null 2>/dev/null
selfserv with PID 29967 found at Mon Jun  6 22:53:43 UTC 2016
selfserv with PID 29967 started at Mon Jun  6 22:53:43 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1439: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29967 at Mon Jun  6 22:53:44 UTC 2016
kill -USR1 29967
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29967 killed at Mon Jun  6 22:53:44 UTC 2016
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:53:44 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:53:44 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 30024 >/dev/null 2>/dev/null
selfserv with PID 30024 found at Mon Jun  6 22:53:44 UTC 2016
selfserv with PID 30024 started at Mon Jun  6 22:53:44 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1440: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 30024 at Mon Jun  6 22:53:45 UTC 2016
kill -USR1 30024
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30024 killed at Mon Jun  6 22:53:45 UTC 2016
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:53:45 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:53:45 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 30081 >/dev/null 2>/dev/null
selfserv with PID 30081 found at Mon Jun  6 22:53:45 UTC 2016
selfserv with PID 30081 started at Mon Jun  6 22:53:45 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1441: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 30081 at Mon Jun  6 22:53:46 UTC 2016
kill -USR1 30081
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30081 killed at Mon Jun  6 22:53:46 UTC 2016
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:53:46 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:53:46 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 30138 >/dev/null 2>/dev/null
selfserv with PID 30138 found at Mon Jun  6 22:53:46 UTC 2016
selfserv with PID 30138 started at Mon Jun  6 22:53:46 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1442: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30138 at Mon Jun  6 22:53:47 UTC 2016
kill -USR1 30138
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30138 killed at Mon Jun  6 22:53:47 UTC 2016
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:53:47 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:53:47 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 30195 >/dev/null 2>/dev/null
selfserv with PID 30195 found at Mon Jun  6 22:53:47 UTC 2016
selfserv with PID 30195 started at Mon Jun  6 22:53:47 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1443: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30195 at Mon Jun  6 22:53:47 UTC 2016
kill -USR1 30195
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30195 killed at Mon Jun  6 22:53:47 UTC 2016
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:53:48 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:53:48 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 30252 >/dev/null 2>/dev/null
selfserv with PID 30252 found at Mon Jun  6 22:53:48 UTC 2016
selfserv with PID 30252 started at Mon Jun  6 22:53:48 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1444: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30252 at Mon Jun  6 22:53:48 UTC 2016
kill -USR1 30252
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30252 killed at Mon Jun  6 22:53:48 UTC 2016
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:53:48 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:53:48 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 30309 >/dev/null 2>/dev/null
selfserv with PID 30309 found at Mon Jun  6 22:53:48 UTC 2016
selfserv with PID 30309 started at Mon Jun  6 22:53:48 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1445: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30309 at Mon Jun  6 22:53:49 UTC 2016
kill -USR1 30309
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30309 killed at Mon Jun  6 22:53:49 UTC 2016
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:53:49 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:53:49 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 30366 >/dev/null 2>/dev/null
selfserv with PID 30366 found at Mon Jun  6 22:53:49 UTC 2016
selfserv with PID 30366 started at Mon Jun  6 22:53:49 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1446: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 30366 at Mon Jun  6 22:53:50 UTC 2016
kill -USR1 30366
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30366 killed at Mon Jun  6 22:53:50 UTC 2016
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:53:50 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:53:50 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 30423 >/dev/null 2>/dev/null
selfserv with PID 30423 found at Mon Jun  6 22:53:50 UTC 2016
selfserv with PID 30423 started at Mon Jun  6 22:53:50 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1447: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 30423 at Mon Jun  6 22:53:51 UTC 2016
kill -USR1 30423
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30423 killed at Mon Jun  6 22:53:51 UTC 2016
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:53:51 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:53:51 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 30480 >/dev/null 2>/dev/null
selfserv with PID 30480 found at Mon Jun  6 22:53:51 UTC 2016
selfserv with PID 30480 started at Mon Jun  6 22:53:51 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1448: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30480 at Mon Jun  6 22:53:52 UTC 2016
kill -USR1 30480
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30480 killed at Mon Jun  6 22:53:52 UTC 2016
ssl.sh: skipping  TLS Request don't require client auth (EC) (bad password) (ECC only)
ssl.sh: skipping  TLS Request don't require client auth (EC) (client auth) (ECC only)
ssl.sh: skipping  TLS Require client auth (EC) (bad password) (ECC only)
ssl.sh: skipping  TLS Require client auth (EC) (client auth) (ECC only)
ssl.sh: skipping  SSL3 Request don't require client auth (EC) (bad password) (ECC only)
ssl.sh: skipping  SSL3 Request don't require client auth (EC) (client auth) (ECC only)
ssl.sh: skipping  SSL3 Require client auth (EC) (bad password) (ECC only)
ssl.sh: skipping  SSL3 Require client auth (EC) (client auth) (ECC only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping  TLS Require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping  TLS Require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping  TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping  TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping  SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping  SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
ssl.sh: skipping  SSL3 Server hello response without SNI for Extended Test
ssl.sh: skipping  SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name on 2d HS for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
ssl.sh: SSL Stress Test Extended Test - server fips/client normal  ===============================
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Mon Jun  6 22:53:53 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss   -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:53:53 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 30706 >/dev/null 2>/dev/null
selfserv with PID 30706 found at Mon Jun  6 22:53:53 UTC 2016
selfserv with PID 30706 started at Mon Jun  6 22:53:53 UTC 2016
strsclnt -q -p 8443 -d ../ext_client  -w nss -c 1000 -C c -V :ssl3 \
          127.0.0.1
strsclnt started at Mon Jun  6 22:53:53 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Mon Jun  6 22:53:55 UTC 2016
ssl.sh: #1449: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30706 at Mon Jun  6 22:53:55 UTC 2016
kill -USR1 30706
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30706 killed at Mon Jun  6 22:53:55 UTC 2016
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Mon Jun  6 22:53:55 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss   -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:53:55 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 30783 >/dev/null 2>/dev/null
selfserv with PID 30783 found at Mon Jun  6 22:53:55 UTC 2016
selfserv with PID 30783 started at Mon Jun  6 22:53:55 UTC 2016
strsclnt -q -p 8443 -d ../ext_client  -w nss -c 1000 -C c \
          127.0.0.1
strsclnt started at Mon Jun  6 22:53:55 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Mon Jun  6 22:53:57 UTC 2016
ssl.sh: #1450: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30783 at Mon Jun  6 22:53:57 UTC 2016
kill -USR1 30783
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30783 killed at Mon Jun  6 22:53:57 UTC 2016
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Mon Jun  6 22:53:57 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss   -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:53:57 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 30859 >/dev/null 2>/dev/null
selfserv with PID 30859 found at Mon Jun  6 22:53:57 UTC 2016
selfserv with PID 30859 started at Mon Jun  6 22:53:57 UTC 2016
strsclnt -q -p 8443 -d ../ext_client  -w nss -c 1000 -C c -g \
          127.0.0.1
strsclnt started at Mon Jun  6 22:53:57 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Mon Jun  6 22:53:59 UTC 2016
ssl.sh: #1451: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30859 at Mon Jun  6 22:53:59 UTC 2016
kill -USR1 30859
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30859 killed at Mon Jun  6 22:53:59 UTC 2016
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Mon Jun  6 22:53:59 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -u -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:53:59 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 30935 >/dev/null 2>/dev/null
selfserv with PID 30935 found at Mon Jun  6 22:53:59 UTC 2016
selfserv with PID 30935 started at Mon Jun  6 22:53:59 UTC 2016
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3: -c 1000 -C c -u \
          127.0.0.1
strsclnt started at Mon Jun  6 22:53:59 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Mon Jun  6 22:54:01 UTC 2016
ssl.sh: #1452: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30935 at Mon Jun  6 22:54:01 UTC 2016
kill -USR1 30935
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30935 killed at Mon Jun  6 22:54:01 UTC 2016
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Mon Jun  6 22:54:02 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:54:02 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 31011 >/dev/null 2>/dev/null
selfserv with PID 31011 found at Mon Jun  6 22:54:02 UTC 2016
selfserv with PID 31011 started at Mon Jun  6 22:54:02 UTC 2016
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3: -c 1000 -C c -z \
          127.0.0.1
strsclnt started at Mon Jun  6 22:54:02 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Mon Jun  6 22:54:04 UTC 2016
ssl.sh: #1453: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 31011 at Mon Jun  6 22:54:04 UTC 2016
kill -USR1 31011
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31011 killed at Mon Jun  6 22:54:04 UTC 2016
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Mon Jun  6 22:54:04 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -u -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:54:04 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 31087 >/dev/null 2>/dev/null
selfserv with PID 31087 found at Mon Jun  6 22:54:04 UTC 2016
selfserv with PID 31087 started at Mon Jun  6 22:54:04 UTC 2016
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3: -c 1000 -C c -u -z \
          127.0.0.1
strsclnt started at Mon Jun  6 22:54:04 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Mon Jun  6 22:54:06 UTC 2016
ssl.sh: #1454: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 31087 at Mon Jun  6 22:54:07 UTC 2016
kill -USR1 31087
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31087 killed at Mon Jun  6 22:54:07 UTC 2016
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Mon Jun  6 22:54:07 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -u -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:54:07 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 31163 >/dev/null 2>/dev/null
selfserv with PID 31163 found at Mon Jun  6 22:54:07 UTC 2016
selfserv with PID 31163 started at Mon Jun  6 22:54:07 UTC 2016
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3: -c 1000 -C c -u -z -g \
          127.0.0.1
strsclnt started at Mon Jun  6 22:54:07 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Mon Jun  6 22:54:09 UTC 2016
ssl.sh: #1455: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 31163 at Mon Jun  6 22:54:09 UTC 2016
kill -USR1 31163
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31163 killed at Mon Jun  6 22:54:09 UTC 2016
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Mon Jun  6 22:54:10 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:54:10 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 31268 >/dev/null 2>/dev/null
selfserv with PID 31268 found at Mon Jun  6 22:54:10 UTC 2016
selfserv with PID 31268 started at Mon Jun  6 22:54:10 UTC 2016
strsclnt -q -p 8443 -d ../ext_client  -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \
          127.0.0.1
strsclnt started at Mon Jun  6 22:54:10 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Mon Jun  6 22:54:12 UTC 2016
ssl.sh: #1456: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 31268 at Mon Jun  6 22:54:12 UTC 2016
kill -USR1 31268
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31268 killed at Mon Jun  6 22:54:12 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Mon Jun  6 22:54:12 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:54:12 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 31343 >/dev/null 2>/dev/null
selfserv with PID 31343 found at Mon Jun  6 22:54:12 UTC 2016
selfserv with PID 31343 started at Mon Jun  6 22:54:12 UTC 2016
strsclnt -q -p 8443 -d ../ext_client  -w nss -c 100 -C c -N -n ExtendedSSLUser \
          127.0.0.1
strsclnt started at Mon Jun  6 22:54:12 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Mon Jun  6 22:54:14 UTC 2016
ssl.sh: #1457: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 31343 at Mon Jun  6 22:54:14 UTC 2016
kill -USR1 31343
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31343 killed at Mon Jun  6 22:54:14 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Mon Jun  6 22:54:15 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -u -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:54:15 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 31418 >/dev/null 2>/dev/null
selfserv with PID 31418 found at Mon Jun  6 22:54:15 UTC 2016
selfserv with PID 31418 started at Mon Jun  6 22:54:15 UTC 2016
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \
          127.0.0.1
strsclnt started at Mon Jun  6 22:54:15 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Mon Jun  6 22:54:15 UTC 2016
ssl.sh: #1458: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 31418 at Mon Jun  6 22:54:15 UTC 2016
kill -USR1 31418
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31418 killed at Mon Jun  6 22:54:15 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Mon Jun  6 22:54:16 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:54:16 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 31494 >/dev/null 2>/dev/null
selfserv with PID 31494 found at Mon Jun  6 22:54:16 UTC 2016
selfserv with PID 31494 started at Mon Jun  6 22:54:16 UTC 2016
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \
          127.0.0.1
strsclnt started at Mon Jun  6 22:54:16 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Mon Jun  6 22:54:16 UTC 2016
ssl.sh: #1459: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 31494 at Mon Jun  6 22:54:17 UTC 2016
kill -USR1 31494
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31494 killed at Mon Jun  6 22:54:17 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Mon Jun  6 22:54:17 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:54:17 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 31570 >/dev/null 2>/dev/null
selfserv with PID 31570 found at Mon Jun  6 22:54:17 UTC 2016
selfserv with PID 31570 started at Mon Jun  6 22:54:17 UTC 2016
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \
          127.0.0.1
strsclnt started at Mon Jun  6 22:54:17 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Mon Jun  6 22:54:18 UTC 2016
ssl.sh: #1460: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 31570 at Mon Jun  6 22:54:18 UTC 2016
kill -USR1 31570
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31570 killed at Mon Jun  6 22:54:18 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Mon Jun  6 22:54:18 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -u -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:54:18 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 31646 >/dev/null 2>/dev/null
selfserv with PID 31646 found at Mon Jun  6 22:54:18 UTC 2016
selfserv with PID 31646 started at Mon Jun  6 22:54:18 UTC 2016
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \
          127.0.0.1
strsclnt started at Mon Jun  6 22:54:18 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Mon Jun  6 22:54:19 UTC 2016
ssl.sh: #1461: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 31646 at Mon Jun  6 22:54:19 UTC 2016
kill -USR1 31646
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31646 killed at Mon Jun  6 22:54:19 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Mon Jun  6 22:54:19 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -u -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:54:19 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 31722 >/dev/null 2>/dev/null
selfserv with PID 31722 found at Mon Jun  6 22:54:19 UTC 2016
selfserv with PID 31722 started at Mon Jun  6 22:54:19 UTC 2016
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \
          127.0.0.1
strsclnt started at Mon Jun  6 22:54:19 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Mon Jun  6 22:54:20 UTC 2016
ssl.sh: #1462: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 31722 at Mon Jun  6 22:54:20 UTC 2016
kill -USR1 31722
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31722 killed at Mon Jun  6 22:54:20 UTC 2016
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test
ssl.sh: skipping  Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only)
ssl.sh: skipping  Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA (ECC only)
ssl.sh: skipping  Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) (ECC only)
ssl.sh: skipping  Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) (ECC only)
ssl.sh: skipping  Stress TLS  ECDHE-RSA   AES 128 CBC with SHA (ECC only)
ssl.sh: skipping  Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) (ECC only)
ssl.sh: skipping  Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only)
ssl.sh: skipping  Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only)
ssl.sh: skipping  Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only)
ssl.sh: skipping  Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only)
ssl.sh: skipping  Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only)
ssl.sh: skipping  Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only)
ssl.sh: SSL - FIPS mode off for server ===============================
ssl.sh: Turning FIPS off for the  server
modutil -dbdir /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/server -fips false -force
FIPS mode already disabled.
ssl.sh: #1463:  (modutil -fips false) produced a returncode of 13, expected is 0 - FAILED
modutil -dbdir /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/server -list
ssl.sh: #1464:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: #1465:  (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED
ssl.sh: Turning FIPS off for the extended  server
modutil -dbdir /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ext_server -fips false -force
FIPS mode already disabled.
ssl.sh: #1466:  (modutil -fips false) produced a returncode of 13, expected is 0 - FAILED
modutil -dbdir /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ext_server -list
ssl.sh: #1467:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: #1468:  (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED
ssl.sh: SSL - FIPS mode on for client ===============================
ssl.sh: Turning FIPS on for the  client
modutil -dbdir /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/client -fips true -force
security library: invalid arguments.
ERROR: Unable to switch FIPS modes.
ssl.sh: #1469:  (modutil -fips true) produced a returncode of 11, expected is 0 - FAILED
modutil -dbdir /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/client -list
ssl.sh: #1470:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: #1471:  (grep "FIPS PKCS #11") produced a returncode of 1, expected is 0 - FAILED
ssl.sh: Turning FIPS on for the extended  client
modutil -dbdir /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ext_client -fips true -force
security library: invalid arguments.
ERROR: Unable to switch FIPS modes.
ssl.sh: #1472:  (modutil -fips true) produced a returncode of 11, expected is 0 - FAILED
modutil -dbdir /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ext_client -list
ssl.sh: #1473:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: #1474:  (grep "FIPS PKCS #11") produced a returncode of 1, expected is 0 - FAILED
ssl.sh: SSL Cipher Coverage  - server normal/client fips  ===============================
selfserv starting at Mon Jun  6 22:54:22 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:54:22 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 32088 >/dev/null 2>/dev/null
selfserv with PID 32088 found at Mon Jun  6 22:54:22 UTC 2016
selfserv with PID 32088 started at Mon Jun  6 22:54:22 UTC 2016
ssl.sh: skipping  SSL2_RC4_128_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_DES_192_EDE3_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 32088 >/dev/null 2>/dev/null
selfserv with PID 32088 found at Mon Jun  6 22:54:23 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1475: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 32088 >/dev/null 2>/dev/null
selfserv with PID 32088 found at Mon Jun  6 22:54:23 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1476: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 32088 >/dev/null 2>/dev/null
selfserv with PID 32088 found at Mon Jun  6 22:54:23 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1477: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 32088 >/dev/null 2>/dev/null
selfserv with PID 32088 found at Mon Jun  6 22:54:23 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1478: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 32088 >/dev/null 2>/dev/null
selfserv with PID 32088 found at Mon Jun  6 22:54:24 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1479: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 32088 >/dev/null 2>/dev/null
selfserv with PID 32088 found at Mon Jun  6 22:54:24 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1480: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 32088 >/dev/null 2>/dev/null
selfserv with PID 32088 found at Mon Jun  6 22:54:24 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1481: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 32088 >/dev/null 2>/dev/null
selfserv with PID 32088 found at Mon Jun  6 22:54:24 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1482: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 32088 >/dev/null 2>/dev/null
selfserv with PID 32088 found at Mon Jun  6 22:54:25 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1483: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 32088 >/dev/null 2>/dev/null
selfserv with PID 32088 found at Mon Jun  6 22:54:25 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1484: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 32088 >/dev/null 2>/dev/null
selfserv with PID 32088 found at Mon Jun  6 22:54:25 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.0   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1485: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 32088 >/dev/null 2>/dev/null
selfserv with PID 32088 found at Mon Jun  6 22:54:25 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.0   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1486: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 32088 >/dev/null 2>/dev/null
selfserv with PID 32088 found at Mon Jun  6 22:54:26 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.0   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1487: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 32088 >/dev/null 2>/dev/null
selfserv with PID 32088 found at Mon Jun  6 22:54:26 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.0   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1488: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 32088 >/dev/null 2>/dev/null
selfserv with PID 32088 found at Mon Jun  6 22:54:26 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.0   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1489: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 32088 >/dev/null 2>/dev/null
selfserv with PID 32088 found at Mon Jun  6 22:54:26 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.0   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1490: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 32088 >/dev/null 2>/dev/null
selfserv with PID 32088 found at Mon Jun  6 22:54:27 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.0   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1491: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 32088 >/dev/null 2>/dev/null
selfserv with PID 32088 found at Mon Jun  6 22:54:27 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.0   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1492: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 32088 >/dev/null 2>/dev/null
selfserv with PID 32088 found at Mon Jun  6 22:54:27 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.0   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1493: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 32088 >/dev/null 2>/dev/null
selfserv with PID 32088 found at Mon Jun  6 22:54:27 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.0   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1494: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 32088 >/dev/null 2>/dev/null
selfserv with PID 32088 found at Mon Jun  6 22:54:28 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1495: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 32088 >/dev/null 2>/dev/null
selfserv with PID 32088 found at Mon Jun  6 22:54:28 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1496: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 32088 >/dev/null 2>/dev/null
selfserv with PID 32088 found at Mon Jun  6 22:54:28 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1497: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  f    TLS11_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  g    TLS11_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 32088 >/dev/null 2>/dev/null
selfserv with PID 32088 found at Mon Jun  6 22:54:28 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1498: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 32088 >/dev/null 2>/dev/null
selfserv with PID 32088 found at Mon Jun  6 22:54:29 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1499: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 32088 >/dev/null 2>/dev/null
selfserv with PID 32088 found at Mon Jun  6 22:54:29 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1500: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 32088 >/dev/null 2>/dev/null
selfserv with PID 32088 found at Mon Jun  6 22:54:29 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1501: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 32088 >/dev/null 2>/dev/null
selfserv with PID 32088 found at Mon Jun  6 22:54:29 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1502: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 32088 >/dev/null 2>/dev/null
selfserv with PID 32088 found at Mon Jun  6 22:54:29 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1503: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 32088 >/dev/null 2>/dev/null
selfserv with PID 32088 found at Mon Jun  6 22:54:30 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1504: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only)
trying to kill selfserv with PID 32088 at Mon Jun  6 22:54:32 UTC 2016
kill -USR1 32088
selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32088 killed at Mon Jun  6 22:54:32 UTC 2016
ssl.sh: SSL Client Authentication  - server normal/client fips  ===============================
ssl.sh: skipping  TLS Request don't require client auth (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:54:32 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:54:32 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 1154 >/dev/null 2>/dev/null
selfserv with PID 1154 found at Mon Jun  6 22:54:32 UTC 2016
selfserv with PID 1154 started at Mon Jun  6 22:54:32 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1505: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1154 at Mon Jun  6 22:54:33 UTC 2016
kill -USR1 1154
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1154 killed at Mon Jun  6 22:54:33 UTC 2016
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Mon Jun  6 22:54:33 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:54:33 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 1258 >/dev/null 2>/dev/null
selfserv with PID 1258 found at Mon Jun  6 22:54:33 UTC 2016
selfserv with PID 1258 started at Mon Jun  6 22:54:33 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -w bogus -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1506: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1258 at Mon Jun  6 22:54:34 UTC 2016
kill -USR1 1258
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1258 killed at Mon Jun  6 22:54:34 UTC 2016
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Mon Jun  6 22:54:34 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:54:34 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 1315 >/dev/null 2>/dev/null
selfserv with PID 1315 found at Mon Jun  6 22:54:34 UTC 2016
selfserv with PID 1315 started at Mon Jun  6 22:54:34 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -w nss -n TestUser   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1507: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1315 at Mon Jun  6 22:54:35 UTC 2016
kill -USR1 1315
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1315 killed at Mon Jun  6 22:54:35 UTC 2016
ssl.sh: skipping  SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:54:35 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:54:35 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 1378 >/dev/null 2>/dev/null
selfserv with PID 1378 found at Mon Jun  6 22:54:35 UTC 2016
selfserv with PID 1378 started at Mon Jun  6 22:54:35 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V :ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1508: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1378 at Mon Jun  6 22:54:35 UTC 2016
kill -USR1 1378
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1378 killed at Mon Jun  6 22:54:35 UTC 2016
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Mon Jun  6 22:54:36 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:54:36 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 1435 >/dev/null 2>/dev/null
selfserv with PID 1435 found at Mon Jun  6 22:54:36 UTC 2016
selfserv with PID 1435 started at Mon Jun  6 22:54:36 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V :ssl3 -n TestUser -w bogus  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1509: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1435 at Mon Jun  6 22:54:36 UTC 2016
kill -USR1 1435
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1435 killed at Mon Jun  6 22:54:36 UTC 2016
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Mon Jun  6 22:54:36 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:54:36 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 1492 >/dev/null 2>/dev/null
selfserv with PID 1492 found at Mon Jun  6 22:54:36 UTC 2016
selfserv with PID 1492 started at Mon Jun  6 22:54:36 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V :ssl3 -n TestUser -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1510: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1492 at Mon Jun  6 22:54:37 UTC 2016
kill -USR1 1492
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1492 killed at Mon Jun  6 22:54:37 UTC 2016
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:54:37 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:54:37 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 1576 >/dev/null 2>/dev/null
selfserv with PID 1576 found at Mon Jun  6 22:54:37 UTC 2016
selfserv with PID 1576 started at Mon Jun  6 22:54:37 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3: -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1511: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1576 at Mon Jun  6 22:54:38 UTC 2016
kill -USR1 1576
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1576 killed at Mon Jun  6 22:54:38 UTC 2016
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:54:38 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:54:38 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 1633 >/dev/null 2>/dev/null
selfserv with PID 1633 found at Mon Jun  6 22:54:38 UTC 2016
selfserv with PID 1633 started at Mon Jun  6 22:54:38 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3: -w bogus -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1512: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1633 at Mon Jun  6 22:54:39 UTC 2016
kill -USR1 1633
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1633 killed at Mon Jun  6 22:54:39 UTC 2016
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:54:39 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:54:39 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 1690 >/dev/null 2>/dev/null
selfserv with PID 1690 found at Mon Jun  6 22:54:39 UTC 2016
selfserv with PID 1690 started at Mon Jun  6 22:54:39 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1513: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1690 at Mon Jun  6 22:54:40 UTC 2016
kill -USR1 1690
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1690 killed at Mon Jun  6 22:54:40 UTC 2016
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only)
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:54:40 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:54:40 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 1753 >/dev/null 2>/dev/null
selfserv with PID 1753 found at Mon Jun  6 22:54:40 UTC 2016
selfserv with PID 1753 started at Mon Jun  6 22:54:40 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1514: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1753 at Mon Jun  6 22:54:41 UTC 2016
kill -USR1 1753
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1753 killed at Mon Jun  6 22:54:41 UTC 2016
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:54:41 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:54:41 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 1810 >/dev/null 2>/dev/null
selfserv with PID 1810 found at Mon Jun  6 22:54:41 UTC 2016
selfserv with PID 1810 started at Mon Jun  6 22:54:41 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1515: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1810 at Mon Jun  6 22:54:42 UTC 2016
kill -USR1 1810
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1810 killed at Mon Jun  6 22:54:42 UTC 2016
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:54:42 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:54:42 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 1870 >/dev/null 2>/dev/null
selfserv with PID 1870 found at Mon Jun  6 22:54:42 UTC 2016
selfserv with PID 1870 started at Mon Jun  6 22:54:42 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1516: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1870 at Mon Jun  6 22:54:42 UTC 2016
kill -USR1 1870
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1870 killed at Mon Jun  6 22:54:42 UTC 2016
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:54:43 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:54:43 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 1933 >/dev/null 2>/dev/null
selfserv with PID 1933 found at Mon Jun  6 22:54:43 UTC 2016
selfserv with PID 1933 started at Mon Jun  6 22:54:43 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1517: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1933 at Mon Jun  6 22:54:43 UTC 2016
kill -USR1 1933
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1933 killed at Mon Jun  6 22:54:43 UTC 2016
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:54:43 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:54:43 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 1992 >/dev/null 2>/dev/null
selfserv with PID 1992 found at Mon Jun  6 22:54:43 UTC 2016
selfserv with PID 1992 started at Mon Jun  6 22:54:43 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w bogus  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1518: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1992 at Mon Jun  6 22:54:44 UTC 2016
kill -USR1 1992
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1992 killed at Mon Jun  6 22:54:44 UTC 2016
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:54:44 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:54:44 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 2051 >/dev/null 2>/dev/null
selfserv with PID 2051 found at Mon Jun  6 22:54:44 UTC 2016
selfserv with PID 2051 started at Mon Jun  6 22:54:44 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1519: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2051 at Mon Jun  6 22:54:45 UTC 2016
kill -USR1 2051
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2051 killed at Mon Jun  6 22:54:45 UTC 2016
ssl.sh: skipping  TLS Request don't require client auth (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth (EC) (client auth) (non-FIPS only)
ssl.sh: skipping  TLS Require client auth (EC) (bad password) (ECC only)
ssl.sh: skipping  TLS Require client auth (EC) (client auth) (ECC only)
ssl.sh: skipping  SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only)
ssl.sh: skipping  SSL3 Require client auth (EC) (bad password) (ECC only)
ssl.sh: skipping  SSL3 Require client auth (EC) (client auth) (ECC only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only)
ssl.sh: skipping  TLS Require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping  TLS Require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only)
ssl.sh: skipping  TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping  TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only)
ssl.sh: skipping  SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping  SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Mon Jun  6 22:54:46 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:54:46 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 2188 >/dev/null 2>/dev/null
selfserv with PID 2188 found at Mon Jun  6 22:54:46 UTC 2016
selfserv with PID 2188 started at Mon Jun  6 22:54:46 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1520: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2188 at Mon Jun  6 22:54:46 UTC 2016
kill -USR1 2188
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2188 killed at Mon Jun  6 22:54:46 UTC 2016
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Mon Jun  6 22:54:47 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:54:47 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 2252 >/dev/null 2>/dev/null
selfserv with PID 2252 found at Mon Jun  6 22:54:47 UTC 2016
selfserv with PID 2252 started at Mon Jun  6 22:54:47 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a testbuildd-sni.(none)  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=testbuildd-sni.(none),E=testbuildd-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1521: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2252 at Mon Jun  6 22:54:47 UTC 2016
kill -USR1 2252
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2252 killed at Mon Jun  6 22:54:47 UTC 2016
ssl.sh: TLS Server response with alert ----
selfserv starting at Mon Jun  6 22:54:47 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:54:47 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 2317 >/dev/null 2>/dev/null
selfserv with PID 2317 found at Mon Jun  6 22:54:47 UTC 2016
selfserv with PID 2317 started at Mon Jun  6 22:54:47 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a testbuildd-sni1.(none)  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #1522: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2317 at Mon Jun  6 22:54:48 UTC 2016
kill -USR1 2317
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2317 killed at Mon Jun  6 22:54:48 UTC 2016
ssl.sh: SSL3 Server hello response without SNI ----
selfserv starting at Mon Jun  6 22:54:48 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:54:48 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 2380 >/dev/null 2>/dev/null
selfserv with PID 2380 found at Mon Jun  6 22:54:48 UTC 2016
selfserv with PID 2380 started at Mon Jun  6 22:54:48 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1523: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2380 at Mon Jun  6 22:54:49 UTC 2016
kill -USR1 2380
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2380 killed at Mon Jun  6 22:54:49 UTC 2016
ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ----
selfserv starting at Mon Jun  6 22:54:49 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:54:49 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 2443 >/dev/null 2>/dev/null
selfserv with PID 2443 found at Mon Jun  6 22:54:49 UTC 2016
selfserv with PID 2443 started at Mon Jun  6 22:54:49 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n TestUser -a testbuildd-sni.(none)  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: authentication of server cert failed: Unable to communicate securely with peer: requested domain name does not match the server's certificate.
tstclnt: exiting with return code 254
ssl.sh: #1524: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2443 at Mon Jun  6 22:54:50 UTC 2016
kill -USR1 2443
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2443 killed at Mon Jun  6 22:54:50 UTC 2016
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Mon Jun  6 22:54:50 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:54:50 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 2506 >/dev/null 2>/dev/null
selfserv with PID 2506 found at Mon Jun  6 22:54:50 UTC 2016
selfserv with PID 2506 started at Mon Jun  6 22:54:50 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1525: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2506 at Mon Jun  6 22:54:51 UTC 2016
kill -USR1 2506
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2506 killed at Mon Jun  6 22:54:51 UTC 2016
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Mon Jun  6 22:54:51 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:54:51 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 2571 >/dev/null 2>/dev/null
selfserv with PID 2571 found at Mon Jun  6 22:54:51 UTC 2016
selfserv with PID 2571 started at Mon Jun  6 22:54:51 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a testbuildd-sni.(none)  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=testbuildd-sni.(none),E=testbuildd-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=testbuildd-sni.(none),E=testbuildd-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1526: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2571 at Mon Jun  6 22:54:52 UTC 2016
kill -USR1 2571
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2571 killed at Mon Jun  6 22:54:52 UTC 2016
ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ----
selfserv starting at Mon Jun  6 22:54:52 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:54:52 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 2635 >/dev/null 2>/dev/null
selfserv with PID 2635 found at Mon Jun  6 22:54:52 UTC 2016
selfserv with PID 2635 started at Mon Jun  6 22:54:52 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a testbuildd-sni.(none) -a testbuildd.(none)  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=testbuildd-sni.(none),E=testbuildd-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 1
ssl.sh: #1527: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2635 at Mon Jun  6 22:54:53 UTC 2016
kill -USR1 2635
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2635 killed at Mon Jun  6 22:54:53 UTC 2016
ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ----
selfserv starting at Mon Jun  6 22:54:53 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:54:53 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 2699 >/dev/null 2>/dev/null
selfserv with PID 2699 found at Mon Jun  6 22:54:53 UTC 2016
selfserv with PID 2699 started at Mon Jun  6 22:54:53 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a testbuildd-sni.(none) -a testbuildd-sni1.(none)  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=testbuildd-sni.(none),E=testbuildd-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 1
ssl.sh: #1528: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2699 at Mon Jun  6 22:54:53 UTC 2016
kill -USR1 2699
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2699 killed at Mon Jun  6 22:54:53 UTC 2016
ssl.sh: TLS Server response with alert ----
selfserv starting at Mon Jun  6 22:54:54 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -r -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:54:54 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 2762 >/dev/null 2>/dev/null
selfserv with PID 2762 found at Mon Jun  6 22:54:54 UTC 2016
selfserv with PID 2762 started at Mon Jun  6 22:54:54 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a testbuildd-sni1.(none)  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #1529: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2762 at Mon Jun  6 22:54:54 UTC 2016
kill -USR1 2762
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2762 killed at Mon Jun  6 22:54:54 UTC 2016
ssl.sh: SSL Stress Test  - server normal/client fips  ===============================
ssl.sh: skipping  Form is subject to the terms of the Mozilla Public (non-FIPS only)
ssl.sh: skipping  If a copy of the MPL was not distributed with this (non-FIPS only)
ssl.sh: skipping  obtain one at http://mozilla.org/MPL/2.0/. (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  the stress tests for SSL/TLS. (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  client                         Test Case name (non-FIPS only)
ssl.sh: skipping  params (non-FIPS only)
ssl.sh: skipping  ------                         --------------- (non-FIPS only)
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 (non-FIPS only)
ssl.sh: skipping  Stress SSL3 RC4 128 with MD5 (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (false start) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (session ticket) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (compression) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (session ticket, compression) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) (non-FIPS only)
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI) (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  versions here... (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 (no reuse, client auth) (non-FIPS only)
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Mon Jun  6 22:54:55 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:54:55 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 2916 >/dev/null 2>/dev/null
selfserv with PID 2916 found at Mon Jun  6 22:54:55 UTC 2016
selfserv with PID 2916 started at Mon Jun  6 22:54:55 UTC 2016
strsclnt -q -p 8443 -d ../client  -w nss -c 100 -C c -V :ssl3 -N -n TestUser \
          127.0.0.1
strsclnt started at Mon Jun  6 22:54:55 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Mon Jun  6 22:54:57 UTC 2016
ssl.sh: #1530: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 2916 at Mon Jun  6 22:54:57 UTC 2016
kill -USR1 2916
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2916 killed at Mon Jun  6 22:54:57 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Mon Jun  6 22:54:57 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:54:57 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 2991 >/dev/null 2>/dev/null
selfserv with PID 2991 found at Mon Jun  6 22:54:57 UTC 2016
selfserv with PID 2991 started at Mon Jun  6 22:54:57 UTC 2016
strsclnt -q -p 8443 -d ../client  -w nss -c 100 -C c -N -n TestUser \
          127.0.0.1
strsclnt started at Mon Jun  6 22:54:57 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Mon Jun  6 22:54:59 UTC 2016
ssl.sh: #1531: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 2991 at Mon Jun  6 22:54:59 UTC 2016
kill -USR1 2991
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2991 killed at Mon Jun  6 22:54:59 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Mon Jun  6 22:54:59 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -u -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:54:59 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 3066 >/dev/null 2>/dev/null
selfserv with PID 3066 found at Mon Jun  6 22:54:59 UTC 2016
selfserv with PID 3066 started at Mon Jun  6 22:54:59 UTC 2016
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -u \
          127.0.0.1
strsclnt started at Mon Jun  6 22:54:59 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Mon Jun  6 22:55:00 UTC 2016
ssl.sh: #1532: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 3066 at Mon Jun  6 22:55:00 UTC 2016
kill -USR1 3066
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3066 killed at Mon Jun  6 22:55:00 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Mon Jun  6 22:55:00 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:55:00 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 3142 >/dev/null 2>/dev/null
selfserv with PID 3142 found at Mon Jun  6 22:55:00 UTC 2016
selfserv with PID 3142 started at Mon Jun  6 22:55:00 UTC 2016
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -z \
          127.0.0.1
strsclnt started at Mon Jun  6 22:55:00 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Mon Jun  6 22:55:01 UTC 2016
ssl.sh: #1533: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 3142 at Mon Jun  6 22:55:01 UTC 2016
kill -USR1 3142
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3142 killed at Mon Jun  6 22:55:01 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Mon Jun  6 22:55:01 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:55:01 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 3223 >/dev/null 2>/dev/null
selfserv with PID 3223 found at Mon Jun  6 22:55:01 UTC 2016
selfserv with PID 3223 started at Mon Jun  6 22:55:01 UTC 2016
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \
          127.0.0.1
strsclnt started at Mon Jun  6 22:55:01 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Mon Jun  6 22:55:02 UTC 2016
ssl.sh: #1534: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 3223 at Mon Jun  6 22:55:02 UTC 2016
kill -USR1 3223
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3223 killed at Mon Jun  6 22:55:02 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Mon Jun  6 22:55:02 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -u -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:55:02 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 3300 >/dev/null 2>/dev/null
selfserv with PID 3300 found at Mon Jun  6 22:55:02 UTC 2016
selfserv with PID 3300 started at Mon Jun  6 22:55:02 UTC 2016
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \
          127.0.0.1
strsclnt started at Mon Jun  6 22:55:02 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Mon Jun  6 22:55:03 UTC 2016
ssl.sh: #1535: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 3300 at Mon Jun  6 22:55:03 UTC 2016
kill -USR1 3300
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3300 killed at Mon Jun  6 22:55:03 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Mon Jun  6 22:55:03 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -u -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:55:03 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 3388 >/dev/null 2>/dev/null
selfserv with PID 3388 found at Mon Jun  6 22:55:04 UTC 2016
selfserv with PID 3388 started at Mon Jun  6 22:55:04 UTC 2016
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \
          127.0.0.1
strsclnt started at Mon Jun  6 22:55:04 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Mon Jun  6 22:55:04 UTC 2016
ssl.sh: #1536: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 3388 at Mon Jun  6 22:55:04 UTC 2016
kill -USR1 3388
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3388 killed at Mon Jun  6 22:55:04 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ----
selfserv starting at Mon Jun  6 22:55:05 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -u -a testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:55:05 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 3470 >/dev/null 2>/dev/null
selfserv with PID 3470 found at Mon Jun  6 22:55:05 UTC 2016
selfserv with PID 3470 started at Mon Jun  6 22:55:05 UTC 2016
strsclnt -q -p 8443 -d ../client  -w nss -V tls1.0: -c 1000 -C c -u \
          127.0.0.1
strsclnt started at Mon Jun  6 22:55:05 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Mon Jun  6 22:55:07 UTC 2016
ssl.sh: #1537: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 3470 at Mon Jun  6 22:55:07 UTC 2016
kill -USR1 3470
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3470 killed at Mon Jun  6 22:55:07 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ----
selfserv starting at Mon Jun  6 22:55:07 UTC 2016
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
          -w nss -r -r -u -a testbuildd-sni.(none) -k testbuildd-sni.(none) -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:55:07 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 3552 >/dev/null 2>/dev/null
selfserv with PID 3552 found at Mon Jun  6 22:55:07 UTC 2016
selfserv with PID 3552 started at Mon Jun  6 22:55:07 UTC 2016
strsclnt -q -p 8443 -d ../client  -w nss -V tls1.0: -c 1000 -C c -u -a testbuildd-sni.(none) \
          127.0.0.1
strsclnt started at Mon Jun  6 22:55:07 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Mon Jun  6 22:55:09 UTC 2016
ssl.sh: #1538: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 3552 at Mon Jun  6 22:55:09 UTC 2016
kill -USR1 3552
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3552 killed at Mon Jun  6 22:55:10 UTC 2016
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  ############################ (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only)
ssl.sh: skipping  Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA (ECC only)
ssl.sh: skipping  Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) (ECC only)
ssl.sh: skipping  Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) (ECC only)
ssl.sh: skipping  Stress TLS  ECDHE-RSA   AES 128 CBC with SHA (ECC only)
ssl.sh: skipping  Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) (ECC only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  versions here... (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only)
ssl.sh: skipping  Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only)
ssl.sh: skipping  Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only)
ssl.sh: skipping  Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only)
ssl.sh: skipping  Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only)
ssl.sh: skipping  Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only)
ssl.sh: SSL Cipher Coverage Extended Test - server normal/client fips  ===============================
selfserv starting at Mon Jun  6 22:55:10 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:55:10 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 3687 >/dev/null 2>/dev/null
selfserv with PID 3687 found at Mon Jun  6 22:55:10 UTC 2016
selfserv with PID 3687 started at Mon Jun  6 22:55:10 UTC 2016
ssl.sh: skipping  SSL2_RC4_128_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 for Extended Test
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 3687 >/dev/null 2>/dev/null
selfserv with PID 3687 found at Mon Jun  6 22:55:11 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1539: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 3687 >/dev/null 2>/dev/null
selfserv with PID 3687 found at Mon Jun  6 22:55:11 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1540: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 3687 >/dev/null 2>/dev/null
selfserv with PID 3687 found at Mon Jun  6 22:55:11 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1541: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 3687 >/dev/null 2>/dev/null
selfserv with PID 3687 found at Mon Jun  6 22:55:12 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1542: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 3687 >/dev/null 2>/dev/null
selfserv with PID 3687 found at Mon Jun  6 22:55:12 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1543: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 3687 >/dev/null 2>/dev/null
selfserv with PID 3687 found at Mon Jun  6 22:55:12 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1544: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 3687 >/dev/null 2>/dev/null
selfserv with PID 3687 found at Mon Jun  6 22:55:12 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1545: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 3687 >/dev/null 2>/dev/null
selfserv with PID 3687 found at Mon Jun  6 22:55:12 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1546: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 3687 >/dev/null 2>/dev/null
selfserv with PID 3687 found at Mon Jun  6 22:55:13 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1547: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 3687 >/dev/null 2>/dev/null
selfserv with PID 3687 found at Mon Jun  6 22:55:13 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1548: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 3687 >/dev/null 2>/dev/null
selfserv with PID 3687 found at Mon Jun  6 22:55:13 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.0   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1549: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 3687 >/dev/null 2>/dev/null
selfserv with PID 3687 found at Mon Jun  6 22:55:13 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.0   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1550: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 3687 >/dev/null 2>/dev/null
selfserv with PID 3687 found at Mon Jun  6 22:55:14 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.0   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1551: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 3687 >/dev/null 2>/dev/null
selfserv with PID 3687 found at Mon Jun  6 22:55:14 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.0   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1552: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 3687 >/dev/null 2>/dev/null
selfserv with PID 3687 found at Mon Jun  6 22:55:14 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.0   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1553: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 3687 >/dev/null 2>/dev/null
selfserv with PID 3687 found at Mon Jun  6 22:55:14 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.0   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1554: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 3687 >/dev/null 2>/dev/null
selfserv with PID 3687 found at Mon Jun  6 22:55:14 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.0   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1555: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 3687 >/dev/null 2>/dev/null
selfserv with PID 3687 found at Mon Jun  6 22:55:15 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.0   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1556: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 3687 >/dev/null 2>/dev/null
selfserv with PID 3687 found at Mon Jun  6 22:55:15 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.0   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1557: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 3687 >/dev/null 2>/dev/null
selfserv with PID 3687 found at Mon Jun  6 22:55:15 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.0   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1558: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 3687 >/dev/null 2>/dev/null
selfserv with PID 3687 found at Mon Jun  6 22:55:15 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1559: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 3687 >/dev/null 2>/dev/null
selfserv with PID 3687 found at Mon Jun  6 22:55:16 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1560: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 3687 >/dev/null 2>/dev/null
selfserv with PID 3687 found at Mon Jun  6 22:55:16 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1561: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  f    TLS11_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  g    TLS11_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 3687 >/dev/null 2>/dev/null
selfserv with PID 3687 found at Mon Jun  6 22:55:16 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1562: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 3687 >/dev/null 2>/dev/null
selfserv with PID 3687 found at Mon Jun  6 22:55:16 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1563: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 3687 >/dev/null 2>/dev/null
selfserv with PID 3687 found at Mon Jun  6 22:55:17 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1564: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 3687 >/dev/null 2>/dev/null
selfserv with PID 3687 found at Mon Jun  6 22:55:17 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1565: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 3687 >/dev/null 2>/dev/null
selfserv with PID 3687 found at Mon Jun  6 22:55:17 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1566: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 3687 >/dev/null 2>/dev/null
selfserv with PID 3687 found at Mon Jun  6 22:55:17 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1567: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 3687 >/dev/null 2>/dev/null
selfserv with PID 3687 found at Mon Jun  6 22:55:17 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1568: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_ECDSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_RSA_WITH_NULL_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_RSA_WITH_RC4_128_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only)
ssl.sh: skipping  TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only)
trying to kill selfserv with PID 3687 at Mon Jun  6 22:55:19 UTC 2016
kill -USR1 3687
selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3687 killed at Mon Jun  6 22:55:19 UTC 2016
ssl.sh: SSL Client Authentication Extended Test - server normal/client fips  ===============================
ssl.sh: skipping  TLS Request don't require client auth (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:55:20 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:55:20 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 5080 >/dev/null 2>/dev/null
selfserv with PID 5080 found at Mon Jun  6 22:55:20 UTC 2016
selfserv with PID 5080 started at Mon Jun  6 22:55:20 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1569: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5080 at Mon Jun  6 22:55:20 UTC 2016
kill -USR1 5080
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5080 killed at Mon Jun  6 22:55:20 UTC 2016
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Mon Jun  6 22:55:20 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:55:20 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 5137 >/dev/null 2>/dev/null
selfserv with PID 5137 found at Mon Jun  6 22:55:20 UTC 2016
selfserv with PID 5137 started at Mon Jun  6 22:55:20 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1570: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5137 at Mon Jun  6 22:55:21 UTC 2016
kill -USR1 5137
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5137 killed at Mon Jun  6 22:55:21 UTC 2016
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Mon Jun  6 22:55:21 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:55:21 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 5194 >/dev/null 2>/dev/null
selfserv with PID 5194 found at Mon Jun  6 22:55:21 UTC 2016
selfserv with PID 5194 started at Mon Jun  6 22:55:21 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -w nss -n ExtendedSSLUser   < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1571: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5194 at Mon Jun  6 22:55:22 UTC 2016
kill -USR1 5194
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5194 killed at Mon Jun  6 22:55:22 UTC 2016
ssl.sh: skipping  SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:55:22 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:55:22 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 5257 >/dev/null 2>/dev/null
selfserv with PID 5257 found at Mon Jun  6 22:55:22 UTC 2016
selfserv with PID 5257 started at Mon Jun  6 22:55:22 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V :ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1572: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5257 at Mon Jun  6 22:55:23 UTC 2016
kill -USR1 5257
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5257 killed at Mon Jun  6 22:55:23 UTC 2016
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Mon Jun  6 22:55:23 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:55:23 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 5314 >/dev/null 2>/dev/null
selfserv with PID 5314 found at Mon Jun  6 22:55:23 UTC 2016
selfserv with PID 5314 started at Mon Jun  6 22:55:23 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser -w bogus  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1573: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5314 at Mon Jun  6 22:55:24 UTC 2016
kill -USR1 5314
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5314 killed at Mon Jun  6 22:55:24 UTC 2016
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Mon Jun  6 22:55:24 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:55:24 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 5371 >/dev/null 2>/dev/null
selfserv with PID 5371 found at Mon Jun  6 22:55:24 UTC 2016
selfserv with PID 5371 started at Mon Jun  6 22:55:24 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1574: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5371 at Mon Jun  6 22:55:25 UTC 2016
kill -USR1 5371
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5371 killed at Mon Jun  6 22:55:25 UTC 2016
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:55:25 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:55:25 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 5434 >/dev/null 2>/dev/null
selfserv with PID 5434 found at Mon Jun  6 22:55:25 UTC 2016
selfserv with PID 5434 started at Mon Jun  6 22:55:25 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3: -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1575: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5434 at Mon Jun  6 22:55:25 UTC 2016
kill -USR1 5434
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5434 killed at Mon Jun  6 22:55:25 UTC 2016
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:55:26 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:55:26 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 5491 >/dev/null 2>/dev/null
selfserv with PID 5491 found at Mon Jun  6 22:55:26 UTC 2016
selfserv with PID 5491 started at Mon Jun  6 22:55:26 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3: -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1576: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5491 at Mon Jun  6 22:55:26 UTC 2016
kill -USR1 5491
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5491 killed at Mon Jun  6 22:55:26 UTC 2016
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:55:26 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:55:26 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 5548 >/dev/null 2>/dev/null
selfserv with PID 5548 found at Mon Jun  6 22:55:26 UTC 2016
selfserv with PID 5548 started at Mon Jun  6 22:55:26 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3: -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1577: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5548 at Mon Jun  6 22:55:27 UTC 2016
kill -USR1 5548
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5548 killed at Mon Jun  6 22:55:27 UTC 2016
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only)
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:55:27 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:55:27 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 5611 >/dev/null 2>/dev/null
selfserv with PID 5611 found at Mon Jun  6 22:55:27 UTC 2016
selfserv with PID 5611 started at Mon Jun  6 22:55:27 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1578: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5611 at Mon Jun  6 22:55:28 UTC 2016
kill -USR1 5611
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5611 killed at Mon Jun  6 22:55:28 UTC 2016
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:55:28 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:55:28 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 5668 >/dev/null 2>/dev/null
selfserv with PID 5668 found at Mon Jun  6 22:55:28 UTC 2016
selfserv with PID 5668 started at Mon Jun  6 22:55:28 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1579: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5668 at Mon Jun  6 22:55:29 UTC 2016
kill -USR1 5668
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5668 killed at Mon Jun  6 22:55:29 UTC 2016
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:55:29 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:55:29 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 5725 >/dev/null 2>/dev/null
selfserv with PID 5725 found at Mon Jun  6 22:55:29 UTC 2016
selfserv with PID 5725 started at Mon Jun  6 22:55:29 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1580: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5725 at Mon Jun  6 22:55:30 UTC 2016
kill -USR1 5725
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5725 killed at Mon Jun  6 22:55:30 UTC 2016
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Mon Jun  6 22:55:30 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:55:30 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 5788 >/dev/null 2>/dev/null
selfserv with PID 5788 found at Mon Jun  6 22:55:30 UTC 2016
selfserv with PID 5788 started at Mon Jun  6 22:55:30 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1581: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5788 at Mon Jun  6 22:55:31 UTC 2016
kill -USR1 5788
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5788 killed at Mon Jun  6 22:55:31 UTC 2016
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Mon Jun  6 22:55:31 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:55:31 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 5845 >/dev/null 2>/dev/null
selfserv with PID 5845 found at Mon Jun  6 22:55:31 UTC 2016
selfserv with PID 5845 started at Mon Jun  6 22:55:31 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1582: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5845 at Mon Jun  6 22:55:32 UTC 2016
kill -USR1 5845
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5845 killed at Mon Jun  6 22:55:32 UTC 2016
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Mon Jun  6 22:55:32 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:55:32 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 5902 >/dev/null 2>/dev/null
selfserv with PID 5902 found at Mon Jun  6 22:55:32 UTC 2016
selfserv with PID 5902 started at Mon Jun  6 22:55:32 UTC 2016
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1583: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5902 at Mon Jun  6 22:55:32 UTC 2016
kill -USR1 5902
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5902 killed at Mon Jun  6 22:55:33 UTC 2016
ssl.sh: skipping  TLS Request don't require client auth (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth (EC) (client auth) (non-FIPS only)
ssl.sh: skipping  TLS Require client auth (EC) (bad password) (ECC only)
ssl.sh: skipping  TLS Require client auth (EC) (client auth) (ECC only)
ssl.sh: skipping  SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only)
ssl.sh: skipping  SSL3 Require client auth (EC) (bad password) (ECC only)
ssl.sh: skipping  SSL3 Require client auth (EC) (client auth) (ECC only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only)
ssl.sh: skipping  TLS Require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping  TLS Require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only)
ssl.sh: skipping  TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping  TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only)
ssl.sh: skipping  SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only)
ssl.sh: skipping  SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only)
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
ssl.sh: skipping  SSL3 Server hello response without SNI for Extended Test
ssl.sh: skipping  SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name on 2d HS for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
ssl.sh: SSL Stress Test Extended Test - server normal/client fips  ===============================
ssl.sh: skipping  Form is subject to the terms of the Mozilla Public (non-FIPS only)
ssl.sh: skipping  If a copy of the MPL was not distributed with this (non-FIPS only)
ssl.sh: skipping  obtain one at http://mozilla.org/MPL/2.0/. (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  the stress tests for SSL/TLS. (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  client                         Test Case name (non-FIPS only)
ssl.sh: skipping  params (non-FIPS only)
ssl.sh: skipping  ------                         --------------- (non-FIPS only)
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 for Extended Test
ssl.sh: skipping  Stress SSL3 RC4 128 with MD5 (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (false start) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (session ticket) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (compression) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (session ticket, compression) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) (non-FIPS only)
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  versions here... (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Mon Jun  6 22:55:34 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:55:34 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 6146 >/dev/null 2>/dev/null
selfserv with PID 6146 found at Mon Jun  6 22:55:34 UTC 2016
selfserv with PID 6146 started at Mon Jun  6 22:55:34 UTC 2016
strsclnt -q -p 8443 -d ../ext_client  -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \
          127.0.0.1
strsclnt started at Mon Jun  6 22:55:34 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Mon Jun  6 22:55:36 UTC 2016
ssl.sh: #1584: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6146 at Mon Jun  6 22:55:36 UTC 2016
kill -USR1 6146
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6146 killed at Mon Jun  6 22:55:36 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Mon Jun  6 22:55:36 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:55:36 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 6221 >/dev/null 2>/dev/null
selfserv with PID 6221 found at Mon Jun  6 22:55:36 UTC 2016
selfserv with PID 6221 started at Mon Jun  6 22:55:36 UTC 2016
strsclnt -q -p 8443 -d ../ext_client  -w nss -c 100 -C c -N -n ExtendedSSLUser \
          127.0.0.1
strsclnt started at Mon Jun  6 22:55:36 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Mon Jun  6 22:55:38 UTC 2016
ssl.sh: #1585: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6221 at Mon Jun  6 22:55:38 UTC 2016
kill -USR1 6221
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6221 killed at Mon Jun  6 22:55:38 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Mon Jun  6 22:55:38 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -u -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:55:38 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 6296 >/dev/null 2>/dev/null
selfserv with PID 6296 found at Mon Jun  6 22:55:39 UTC 2016
selfserv with PID 6296 started at Mon Jun  6 22:55:39 UTC 2016
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \
          127.0.0.1
strsclnt started at Mon Jun  6 22:55:39 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Mon Jun  6 22:55:39 UTC 2016
ssl.sh: #1586: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6296 at Mon Jun  6 22:55:39 UTC 2016
kill -USR1 6296
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6296 killed at Mon Jun  6 22:55:39 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Mon Jun  6 22:55:40 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:55:40 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 6372 >/dev/null 2>/dev/null
selfserv with PID 6372 found at Mon Jun  6 22:55:40 UTC 2016
selfserv with PID 6372 started at Mon Jun  6 22:55:40 UTC 2016
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \
          127.0.0.1
strsclnt started at Mon Jun  6 22:55:40 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Mon Jun  6 22:55:40 UTC 2016
ssl.sh: #1587: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6372 at Mon Jun  6 22:55:40 UTC 2016
kill -USR1 6372
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6372 killed at Mon Jun  6 22:55:41 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Mon Jun  6 22:55:41 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:55:41 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 6448 >/dev/null 2>/dev/null
selfserv with PID 6448 found at Mon Jun  6 22:55:41 UTC 2016
selfserv with PID 6448 started at Mon Jun  6 22:55:41 UTC 2016
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \
          127.0.0.1
strsclnt started at Mon Jun  6 22:55:41 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Mon Jun  6 22:55:42 UTC 2016
ssl.sh: #1588: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6448 at Mon Jun  6 22:55:42 UTC 2016
kill -USR1 6448
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6448 killed at Mon Jun  6 22:55:42 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Mon Jun  6 22:55:42 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -u -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:55:42 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 6524 >/dev/null 2>/dev/null
selfserv with PID 6524 found at Mon Jun  6 22:55:42 UTC 2016
selfserv with PID 6524 started at Mon Jun  6 22:55:42 UTC 2016
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \
          127.0.0.1
strsclnt started at Mon Jun  6 22:55:42 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Mon Jun  6 22:55:43 UTC 2016
ssl.sh: #1589: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6524 at Mon Jun  6 22:55:43 UTC 2016
kill -USR1 6524
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6524 killed at Mon Jun  6 22:55:43 UTC 2016
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Mon Jun  6 22:55:43 UTC 2016
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
          -w nss -r -r -u -z -i ../tests_pid.1853  &
trying to connect to selfserv at Mon Jun  6 22:55:43 UTC 2016
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
kill -0 6600 >/dev/null 2>/dev/null
selfserv with PID 6600 found at Mon Jun  6 22:55:43 UTC 2016
selfserv with PID 6600 started at Mon Jun  6 22:55:43 UTC 2016
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \
          127.0.0.1
strsclnt started at Mon Jun  6 22:55:43 UTC 2016
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Mon Jun  6 22:55:44 UTC 2016
ssl.sh: #1590: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6600 at Mon Jun  6 22:55:44 UTC 2016
kill -USR1 6600
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6600 killed at Mon Jun  6 22:55:44 UTC 2016
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  ############################ (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only)
ssl.sh: skipping  Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA (ECC only)
ssl.sh: skipping  Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) (ECC only)
ssl.sh: skipping  Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) (ECC only)
ssl.sh: skipping  Stress TLS  ECDHE-RSA   AES 128 CBC with SHA (ECC only)
ssl.sh: skipping  Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) (ECC only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  versions here... (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only)
ssl.sh: skipping  Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only)
ssl.sh: skipping  Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only)
ssl.sh: skipping  Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only)
ssl.sh: skipping  Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only)
ssl.sh: skipping  Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only)
ssl.sh: SSL - FIPS mode off for client ===============================
ssl.sh: Turning FIPS off for the  client
modutil -dbdir /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/client -fips false -force
FIPS mode already disabled.
ssl.sh: #1591:  (modutil -fips false) produced a returncode of 13, expected is 0 - FAILED
modutil -dbdir /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/client -list
ssl.sh: #1592:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: #1593:  (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED
ssl.sh: Turning FIPS off for the extended  client
modutil -dbdir /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ext_client -fips false -force
FIPS mode already disabled.
ssl.sh: #1594:  (modutil -fips false) produced a returncode of 13, expected is 0 - FAILED
modutil -dbdir /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/ext_client -list
ssl.sh: #1595:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: #1596:  (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED
TIMESTAMP ssl END: Mon Jun  6 22:55:45 UTC 2016
Running tests for ocsp
TIMESTAMP ocsp BEGIN: Mon Jun  6 22:55:45 UTC 2016
ocsp.sh: OCSP tests ===============================
TIMESTAMP ocsp END: Mon Jun  6 22:55:45 UTC 2016
Running tests for merge
TIMESTAMP merge BEGIN: Mon Jun  6 22:55:45 UTC 2016
merge.sh: Merge Tests ===============================
merge.sh: Creating an SDR key & Encrypt
sdrtest -d . -o /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests.v3.1853 -t Test2 -f ../tests.pw
merge.sh: #1597: Creating SDR Key  - PASSED
merge.sh: Merging in Key for Existing user
certutil --merge --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #1598: Merging Dave  - PASSED
merge.sh: Merging in new user 
certutil --merge --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #1599: Merging server  - PASSED
merge.sh: Merging in new chain 
certutil --merge --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #1600: Merging ext_client  - PASSED
merge.sh: Merging in conflicting nicknames 1
certutil --merge --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #1601: Merging conflicting nicknames 1  - PASSED
merge.sh: Merging in conflicting nicknames 1
certutil --merge --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #1602: Merging conflicting nicknames 2  - PASSED
merge.sh: Verify nicknames were deconflicted (Alice #4)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 45 (0x2d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:54 2016
            Not After : Sun Jun 06 22:42:54 2021
        Subject: "CN=TestUser45,E=TestUser45@bogus.com,O=BOGUS NSS,L=Mountain
             View,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d7:40:08:d6:d0:40:b5:5d:54:83:c9:dd:4e:29:de:86:
                    7a:1c:44:fe:c4:8f:98:d4:27:8f:26:ff:91:dc:4d:01:
                    d6:5f:cf:65:b7:d2:88:95:bd:53:28:09:41:f8:e9:8a:
                    df:36:ce:0d:c2:d0:bc:b1:e4:d6:61:54:7f:93:f5:9e:
                    05:71:96:78:58:7f:7f:84:7c:d8:d1:36:95:45:f9:11:
                    d7:56:e6:4e:25:37:92:eb:38:2d:cd:5e:09:15:d6:e2:
                    ca:6e:4e:ab:80:43:ec:70:ed:bd:25:2d:a9:49:53:a3:
                    1d:22:f1:62:59:e4:3a:49:bb:8b:fe:57:66:fa:48:29
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8a:0d:bd:08:23:27:58:5d:9e:f3:a9:20:12:56:04:9e:
        11:63:43:4f:ea:0a:60:80:43:2f:c0:31:b8:6b:01:2b:
        cc:b6:40:d2:ae:0e:3e:1a:7d:88:71:ae:01:f3:ea:ff:
        bd:dc:94:26:f7:e9:0f:d1:21:d2:18:c9:df:b9:96:40:
        08:e5:a4:ec:0f:78:4b:3e:d5:ee:69:0e:ec:b6:da:f7:
        0b:13:21:4d:56:a0:37:4f:65:a8:02:24:9b:db:38:4b:
        c1:4c:58:72:af:2f:6c:99:26:28:e9:97:ce:e9:f4:fe:
        0c:13:0d:c1:34:3b:12:b6:f1:c3:de:4c:72:d0:2e:e8
    Fingerprint (MD5):
        D8:26:4D:D5:A2:0C:ED:93:79:EB:82:CB:FB:1D:45:55
    Fingerprint (SHA1):
        53:17:5D:3A:37:C2:CC:8D:57:19:D6:E3:5D:7F:D1:08:B5:0D:93:6B

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

merge.sh: #1603: Verify nicknames were deconflicted (Alice #4)  - PASSED
merge.sh: Verify nicknames were deconflicted (Alice #100)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 46 (0x2e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Mon Jun 06 22:42:56 2016
            Not After : Sun Jun 06 22:42:56 2021
        Subject: "CN=TestUser46,E=TestUser46@bogus.com,O=BOGUS NSS,L=Mountain
             View,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b7:60:f6:53:54:aa:92:24:6c:9f:44:3b:7a:c8:93:0b:
                    9f:74:99:67:81:d3:79:b6:05:7a:78:c0:23:92:ef:d3:
                    a9:a4:31:96:9c:f6:63:58:74:7e:c9:b6:15:20:bd:20:
                    83:88:2e:90:66:82:41:fd:f1:72:17:82:a2:86:ad:e1:
                    34:0d:ca:7c:0c:a1:79:ba:f1:0d:f2:84:41:48:73:bc:
                    16:d3:a0:35:8f:f7:04:4a:ac:81:49:e4:16:25:84:54:
                    6d:5a:d7:22:ae:45:07:56:c1:af:da:d8:38:24:96:8b:
                    89:91:2a:16:bc:bb:f6:f0:7b:38:a9:9f:f0:c7:18:53
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        cb:e3:46:8d:51:2e:80:b3:57:85:4f:96:80:2b:97:18:
        07:f8:2a:ff:6e:13:7a:94:3e:22:db:0b:8c:c9:6d:01:
        d5:96:3b:c1:86:15:a2:d4:a1:43:ca:a1:74:70:fa:a4:
        7f:20:5f:07:e3:91:80:20:12:c1:d1:0d:37:43:cf:32:
        12:62:58:f3:0f:1b:42:9b:75:ac:43:51:45:29:7f:24:
        03:8a:89:bb:2f:8d:c6:2c:4f:18:24:d9:a5:75:8b:40:
        5a:78:00:52:e1:18:49:f5:76:61:e1:94:2c:25:c1:08:
        8c:aa:5a:5d:03:e3:8c:99:26:19:fd:64:81:8e:fd:b4
    Fingerprint (MD5):
        BD:E4:C6:94:BA:17:74:A1:1A:C4:D5:D1:DB:52:B5:59
    Fingerprint (SHA1):
        C9:67:57:FE:D9:99:C4:62:1A:13:5E:04:03:A7:A1:2E:6D:AD:29:0D

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

merge.sh: #1604: Verify nicknames were deconflicted (Alice #100)  - PASSED
merge.sh: Merging in SDR 
certutil --merge --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #1605: Merging SDR  - PASSED

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

Alice                                                        u,u,u
bob@bogus.com                                                ,,   
eve@bogus.com                                                ,,   
Dave                                                         u,u,u
127.0.0.1                                                    u,u,u
clientCA                                                     T,C,C
chain-2-clientCA                                             ,,   
Alice #1                                                     ,,   
Alice #3                                                     ,,   
Alice #100                                                   ,,   
TestCA                                                       CT,C,C
testbuildd-sni.(none)                                        u,u,u
ExtendedSSLUser                                              u,u,u
serverCA                                                     C,C,C
chain-1-clientCA                                             ,,   
Alice #2                                                     ,,   
Alice #99                                                    ,,   
Alice #4                                                     ,,   


CRL names                                CRL Type

TestCA                                   CRL  
merge.sh: Decrypt - With Original SDR Key
sdrtest -d . -i /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests.v3.1853 -t Test2 -f ../tests.pw
merge.sh: #1606: Decrypt - Value 3  - PASSED
merge.sh: Decrypt - With Merged SDR Key
sdrtest -d . -i /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests.v1.1853 -t Test1 -f ../tests.pw
merge.sh: #1607: Decrypt - Value 1  - PASSED
merge.sh: Signing with merged key  ------------------
cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig
merge.sh: #1608: Create Detached Signature Dave . - PASSED
cmsutil -D -i dave.dsig -c alice.txt -d . 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
merge.sh: #1609: Verifying Dave's Detached Signature  - PASSED
merge.sh: verifying  merged cert  ------------------
certutil -V -n ExtendedSSLUser -u C -d .
certutil: certificate is valid
merge.sh: #1610: Verifying ExtendedSSL User Cert  - PASSED
merge.sh: verifying  merged crl  ------------------
crlutil -L -n TestCA -d .
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US"
    This Update: Mon Jun 06 22:43:08 2016
    Entry 1 (0x1):
        Serial Number: 40 (0x28)
        Revocation Date: Mon Jun 06 22:41:54 2016
        Entry Extensions:
            Name: CRL reason code

    Entry 2 (0x2):
        Serial Number: 42 (0x2a)
        Revocation Date: Mon Jun 06 22:43:06 2016
    CRL Extensions:
        Name: Certificate Issuer Alt Name
        RFC822 Name: "caemail@ca.com"
        DNS name: "ca.com"
        Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo
            rnia,C=US"
        URI: "http://ca.com"
        IP Address:
            87:0b:31:39:32:2e:31:36:38:2e:30:2e:31

merge.sh: #1611: Verifying TestCA CRL  - PASSED
TIMESTAMP merge END: Mon Jun  6 22:55:47 UTC 2016
Running tests for pkits
TIMESTAMP pkits BEGIN: Mon Jun  6 22:55:47 UTC 2016
pkits.sh: PKITS data directory not defined, skipping.
TIMESTAMP pkits END: Mon Jun  6 22:55:47 UTC 2016
Running tests for chains
TIMESTAMP chains BEGIN: Mon Jun  6 22:55:47 UTC 2016
httpserv starting at Mon Jun  6 22:55:48 UTC 2016
httpserv -D -p 8641  \
         -i /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/aiahttp/http_pid.1853  &
trying to connect to httpserv at Mon Jun  6 22:55:48 UTC 2016
tstclnt -p 8641 -h 127.0.0.1 -q -v
tstclnt: connecting to 127.0.0.1:8641 (address=127.0.0.1)
kill -0 6986 >/dev/null 2>/dev/null
httpserv with PID 6986 found at Mon Jun  6 22:55:48 UTC 2016
httpserv with PID 6986 started at Mon Jun  6 22:55:48 UTC 2016
chains.sh: Certificate Chains Tests ===============================
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #1612: Bridge: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -m 606225548 < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #1613: Bridge: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #1614: Bridge: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #1615: Bridge: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -m 606225549 < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #1616: Bridge: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #1617: Bridge: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #1618: Bridge: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o BridgeReq.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #1619: Bridge: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 606225550 -7 Bridge@Army  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #1620: Bridge: Creating certficate BridgeArmy.der signed by Army  - PASSED
chains.sh: Importing certificate BridgeArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der
chains.sh: #1621: Bridge: Importing certificate BridgeArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 606225551 -7 Bridge@Navy  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #1622: Bridge: Creating certficate BridgeNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate BridgeNavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der
chains.sh: #1623: Bridge: Importing certificate BridgeNavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7
chains.sh: #1624: Bridge: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #1625: Bridge: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o UserReq.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #1626: Bridge: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserBridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 606225552   < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #1627: Bridge: Creating certficate UserBridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate UserBridge.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der
chains.sh: #1628: Bridge: Importing certificate UserBridge.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #1629: Bridge: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Army.der to AllDB database
certutil -A -n Army  -t "" -d AllDB -f AllDB/dbpasswd -i Army.der
chains.sh: #1630: Bridge: Importing certificate Army.der to AllDB database  - PASSED
chains.sh: Importing certificate Navy.der to AllDB database
certutil -A -n Navy  -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der
chains.sh: #1631: Bridge: Importing certificate Navy.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags   -d AllDB     -t Navy
vfychain -d AllDB -pp -vv       UserBridge.der BridgeNavy.der  -t Navy
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225549 (0x2422448d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Mon Jun 06 22:55:51 2016
            Not After : Sun Jun 06 22:55:51 2066
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    da:35:82:0e:c2:45:8b:b4:42:23:3d:19:e5:d3:97:f4:
                    79:5d:d8:ae:20:ca:8d:81:fd:6d:a0:10:47:8c:eb:4f:
                    1c:11:bd:53:36:9d:6d:87:0d:ea:33:f5:82:cb:55:f8:
                    4a:ad:94:26:8c:44:65:0e:57:e7:bd:27:2e:d2:6b:8a:
                    3a:46:2e:c5:21:f8:c4:af:da:7a:40:78:3a:20:e5:a1:
                    c6:27:13:3e:cb:d9:4e:68:65:be:2a:23:ca:d1:56:25:
                    a5:ce:0e:c5:9a:53:7d:b9:0c:8b:86:21:25:be:eb:8b:
                    9a:45:87:bc:ac:2e:3e:ff:f4:5b:2a:11:38:1b:11:cf
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        0b:85:e3:84:38:8f:68:2a:f0:1f:c5:8c:e3:77:43:55:
        ae:ed:0d:0a:1f:29:49:2f:59:db:86:5f:6c:35:5e:4a:
        4b:47:52:f9:62:91:a1:f6:68:04:56:03:70:cb:62:4c:
        63:47:48:8d:cc:5b:67:ff:1d:a8:6b:65:a2:9b:77:a3:
        18:ef:85:61:9c:59:c9:86:8e:cc:fb:61:44:78:16:60:
        b0:49:13:af:2f:77:80:1c:59:09:16:b6:88:fb:1a:dc:
        5c:5f:d3:9d:75:15:4b:20:3d:a0:2e:c4:12:fd:a4:46:
        64:2f:b1:75:b6:68:21:3f:52:2b:a0:bd:48:1e:18:78
    Fingerprint (MD5):
        21:C1:CE:3A:0D:F6:02:C5:8B:01:F6:10:EE:77:8C:26
    Fingerprint (SHA1):
        E8:3A:26:1C:E2:17:5C:2E:8E:9D:1C:99:35:98:2F:73:A4:34:18:E3

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #1632: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags   -d AllDB     -t Navy - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags   -d AllDB     -t Army
vfychain -d AllDB -pp -vv       UserBridge.der BridgeArmy.der  -t Army
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225548 (0x2422448c)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Mon Jun 06 22:55:49 2016
            Not After : Sun Jun 06 22:55:49 2066
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a9:65:99:d5:56:74:be:d9:9b:a9:92:8d:41:47:1a:7c:
                    d6:4a:f4:99:2d:9f:09:9a:75:b4:92:0a:02:f9:9a:c9:
                    fb:fb:65:64:77:16:4b:70:35:33:e4:26:a7:da:8f:de:
                    66:72:a8:34:cb:59:f2:21:f5:4d:4f:56:58:1d:d4:1d:
                    72:84:f1:03:b3:3d:29:e6:34:ac:58:e3:e9:d3:93:16:
                    1a:e0:e5:a7:2e:77:d6:49:1c:a0:53:5c:00:ed:bf:7d:
                    62:aa:ed:95:64:f7:f2:9d:8f:3e:84:03:28:16:4a:4b:
                    7b:c9:0b:43:33:be:1b:a7:74:e8:2f:4c:aa:7c:86:c9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        85:43:30:77:42:1e:94:77:34:23:48:72:2d:2c:3f:89:
        26:b8:ee:a2:57:46:8c:23:83:66:35:8b:94:a0:f6:b0:
        e7:ff:e3:09:53:b2:50:18:e2:25:aa:a1:db:24:9e:aa:
        c2:1c:78:bb:b3:64:d1:ca:7e:20:2f:e2:7d:f4:0f:50:
        07:97:9d:12:50:9c:8b:28:aa:31:88:e3:67:10:42:6a:
        23:20:55:01:9d:b9:aa:a9:92:8f:9b:3f:25:84:0a:88:
        5c:ac:56:30:90:16:35:ea:f1:3b:5b:ac:3a:8b:a5:5a:
        40:07:f7:fc:cf:2e:d9:f9:27:ed:51:8e:49:02:bc:48
    Fingerprint (MD5):
        D5:47:0F:C1:75:01:A8:3B:45:A6:83:A7:92:0F:7C:97
    Fingerprint (SHA1):
        55:B1:70:B6:7D:22:0E:A9:C0:B2:39:46:BD:60:7F:42:71:A1:2D:DF

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #1633: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags   -d AllDB     -t Army - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags   -d AllDB     -t Army
vfychain -d AllDB -pp -vv       UserBridge.der BridgeNavy.der  -t Army
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Navy [Certificate Authority]:
  ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #1634: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags   -d AllDB     -t Army - PASSED
chains.sh: Importing certificate BridgeArmy.der to AllDB database
certutil -A -n Bridge  -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der
chains.sh: #1635: Bridge: Importing certificate BridgeArmy.der to AllDB database  - PASSED
chains.sh: Importing certificate BridgeNavy.der to AllDB database
certutil -A -n Bridge  -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der
chains.sh: #1636: Bridge: Importing certificate BridgeNavy.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags   -d AllDB     -t Army
vfychain -d AllDB -pp -vv       UserBridge.der  -t Army
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225548 (0x2422448c)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Mon Jun 06 22:55:49 2016
            Not After : Sun Jun 06 22:55:49 2066
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a9:65:99:d5:56:74:be:d9:9b:a9:92:8d:41:47:1a:7c:
                    d6:4a:f4:99:2d:9f:09:9a:75:b4:92:0a:02:f9:9a:c9:
                    fb:fb:65:64:77:16:4b:70:35:33:e4:26:a7:da:8f:de:
                    66:72:a8:34:cb:59:f2:21:f5:4d:4f:56:58:1d:d4:1d:
                    72:84:f1:03:b3:3d:29:e6:34:ac:58:e3:e9:d3:93:16:
                    1a:e0:e5:a7:2e:77:d6:49:1c:a0:53:5c:00:ed:bf:7d:
                    62:aa:ed:95:64:f7:f2:9d:8f:3e:84:03:28:16:4a:4b:
                    7b:c9:0b:43:33:be:1b:a7:74:e8:2f:4c:aa:7c:86:c9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        85:43:30:77:42:1e:94:77:34:23:48:72:2d:2c:3f:89:
        26:b8:ee:a2:57:46:8c:23:83:66:35:8b:94:a0:f6:b0:
        e7:ff:e3:09:53:b2:50:18:e2:25:aa:a1:db:24:9e:aa:
        c2:1c:78:bb:b3:64:d1:ca:7e:20:2f:e2:7d:f4:0f:50:
        07:97:9d:12:50:9c:8b:28:aa:31:88:e3:67:10:42:6a:
        23:20:55:01:9d:b9:aa:a9:92:8f:9b:3f:25:84:0a:88:
        5c:ac:56:30:90:16:35:ea:f1:3b:5b:ac:3a:8b:a5:5a:
        40:07:f7:fc:cf:2e:d9:f9:27:ed:51:8e:49:02:bc:48
    Fingerprint (MD5):
        D5:47:0F:C1:75:01:A8:3B:45:A6:83:A7:92:0F:7C:97
    Fingerprint (SHA1):
        55:B1:70:B6:7D:22:0E:A9:C0:B2:39:46:BD:60:7F:42:71:A1:2D:DF

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #1637: Bridge: Verifying certificate(s)  UserBridge.der with flags   -d AllDB     -t Army - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags   -d AllDB     -t Navy
vfychain -d AllDB -pp -vv       UserBridge.der  -t Navy
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225549 (0x2422448d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Mon Jun 06 22:55:51 2016
            Not After : Sun Jun 06 22:55:51 2066
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    da:35:82:0e:c2:45:8b:b4:42:23:3d:19:e5:d3:97:f4:
                    79:5d:d8:ae:20:ca:8d:81:fd:6d:a0:10:47:8c:eb:4f:
                    1c:11:bd:53:36:9d:6d:87:0d:ea:33:f5:82:cb:55:f8:
                    4a:ad:94:26:8c:44:65:0e:57:e7:bd:27:2e:d2:6b:8a:
                    3a:46:2e:c5:21:f8:c4:af:da:7a:40:78:3a:20:e5:a1:
                    c6:27:13:3e:cb:d9:4e:68:65:be:2a:23:ca:d1:56:25:
                    a5:ce:0e:c5:9a:53:7d:b9:0c:8b:86:21:25:be:eb:8b:
                    9a:45:87:bc:ac:2e:3e:ff:f4:5b:2a:11:38:1b:11:cf
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        0b:85:e3:84:38:8f:68:2a:f0:1f:c5:8c:e3:77:43:55:
        ae:ed:0d:0a:1f:29:49:2f:59:db:86:5f:6c:35:5e:4a:
        4b:47:52:f9:62:91:a1:f6:68:04:56:03:70:cb:62:4c:
        63:47:48:8d:cc:5b:67:ff:1d:a8:6b:65:a2:9b:77:a3:
        18:ef:85:61:9c:59:c9:86:8e:cc:fb:61:44:78:16:60:
        b0:49:13:af:2f:77:80:1c:59:09:16:b6:88:fb:1a:dc:
        5c:5f:d3:9d:75:15:4b:20:3d:a0:2e:c4:12:fd:a4:46:
        64:2f:b1:75:b6:68:21:3f:52:2b:a0:bd:48:1e:18:78
    Fingerprint (MD5):
        21:C1:CE:3A:0D:F6:02:C5:8B:01:F6:10:EE:77:8C:26
    Fingerprint (SHA1):
        E8:3A:26:1C:E2:17:5C:2E:8E:9D:1C:99:35:98:2F:73:A4:34:18:E3

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #1638: Bridge: Verifying certificate(s)  UserBridge.der with flags   -d AllDB     -t Navy - PASSED
chains.sh: Creating DB ArmyOnlyDB
certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd
chains.sh: #1639: Bridge: Creating DB ArmyOnlyDB  - PASSED
chains.sh: Importing certificate Army.der to ArmyOnlyDB database
certutil -A -n Army  -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der
chains.sh: #1640: Bridge: Importing certificate Army.der to ArmyOnlyDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags   -d ArmyOnlyDB    
vfychain -d ArmyOnlyDB -pp -vv       UserBridge.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=User EE,O=User,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #1641: Bridge: Verifying certificate(s)  UserBridge.der with flags   -d ArmyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags   -d ArmyOnlyDB    
vfychain -d ArmyOnlyDB -pp -vv       UserBridge.der BridgeNavy.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. bridge@navy [Certificate Authority]:
Email Address(es): bridge@navy
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #1642: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags   -d ArmyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags   -d ArmyOnlyDB    
vfychain -d ArmyOnlyDB -pp -vv       UserBridge.der BridgeNavy.der Navy.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #1643: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags   -d ArmyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags   -d ArmyOnlyDB     -t Navy.der
vfychain -d ArmyOnlyDB -pp -vv       UserBridge.der BridgeNavy.der Navy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225549 (0x2422448d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Mon Jun 06 22:55:51 2016
            Not After : Sun Jun 06 22:55:51 2066
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    da:35:82:0e:c2:45:8b:b4:42:23:3d:19:e5:d3:97:f4:
                    79:5d:d8:ae:20:ca:8d:81:fd:6d:a0:10:47:8c:eb:4f:
                    1c:11:bd:53:36:9d:6d:87:0d:ea:33:f5:82:cb:55:f8:
                    4a:ad:94:26:8c:44:65:0e:57:e7:bd:27:2e:d2:6b:8a:
                    3a:46:2e:c5:21:f8:c4:af:da:7a:40:78:3a:20:e5:a1:
                    c6:27:13:3e:cb:d9:4e:68:65:be:2a:23:ca:d1:56:25:
                    a5:ce:0e:c5:9a:53:7d:b9:0c:8b:86:21:25:be:eb:8b:
                    9a:45:87:bc:ac:2e:3e:ff:f4:5b:2a:11:38:1b:11:cf
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        0b:85:e3:84:38:8f:68:2a:f0:1f:c5:8c:e3:77:43:55:
        ae:ed:0d:0a:1f:29:49:2f:59:db:86:5f:6c:35:5e:4a:
        4b:47:52:f9:62:91:a1:f6:68:04:56:03:70:cb:62:4c:
        63:47:48:8d:cc:5b:67:ff:1d:a8:6b:65:a2:9b:77:a3:
        18:ef:85:61:9c:59:c9:86:8e:cc:fb:61:44:78:16:60:
        b0:49:13:af:2f:77:80:1c:59:09:16:b6:88:fb:1a:dc:
        5c:5f:d3:9d:75:15:4b:20:3d:a0:2e:c4:12:fd:a4:46:
        64:2f:b1:75:b6:68:21:3f:52:2b:a0:bd:48:1e:18:78
    Fingerprint (MD5):
        21:C1:CE:3A:0D:F6:02:C5:8B:01:F6:10:EE:77:8C:26
    Fingerprint (SHA1):
        E8:3A:26:1C:E2:17:5C:2E:8E:9D:1C:99:35:98:2F:73:A4:34:18:E3


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #1644: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags   -d ArmyOnlyDB     -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags   -d ArmyOnlyDB     -t Navy.der
vfychain -d ArmyOnlyDB -pp -vv       UserBridge.der BridgeNavy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225549 (0x2422448d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Mon Jun 06 22:55:51 2016
            Not After : Sun Jun 06 22:55:51 2066
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    da:35:82:0e:c2:45:8b:b4:42:23:3d:19:e5:d3:97:f4:
                    79:5d:d8:ae:20:ca:8d:81:fd:6d:a0:10:47:8c:eb:4f:
                    1c:11:bd:53:36:9d:6d:87:0d:ea:33:f5:82:cb:55:f8:
                    4a:ad:94:26:8c:44:65:0e:57:e7:bd:27:2e:d2:6b:8a:
                    3a:46:2e:c5:21:f8:c4:af:da:7a:40:78:3a:20:e5:a1:
                    c6:27:13:3e:cb:d9:4e:68:65:be:2a:23:ca:d1:56:25:
                    a5:ce:0e:c5:9a:53:7d:b9:0c:8b:86:21:25:be:eb:8b:
                    9a:45:87:bc:ac:2e:3e:ff:f4:5b:2a:11:38:1b:11:cf
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        0b:85:e3:84:38:8f:68:2a:f0:1f:c5:8c:e3:77:43:55:
        ae:ed:0d:0a:1f:29:49:2f:59:db:86:5f:6c:35:5e:4a:
        4b:47:52:f9:62:91:a1:f6:68:04:56:03:70:cb:62:4c:
        63:47:48:8d:cc:5b:67:ff:1d:a8:6b:65:a2:9b:77:a3:
        18:ef:85:61:9c:59:c9:86:8e:cc:fb:61:44:78:16:60:
        b0:49:13:af:2f:77:80:1c:59:09:16:b6:88:fb:1a:dc:
        5c:5f:d3:9d:75:15:4b:20:3d:a0:2e:c4:12:fd:a4:46:
        64:2f:b1:75:b6:68:21:3f:52:2b:a0:bd:48:1e:18:78
    Fingerprint (MD5):
        21:C1:CE:3A:0D:F6:02:C5:8B:01:F6:10:EE:77:8C:26
    Fingerprint (SHA1):
        E8:3A:26:1C:E2:17:5C:2E:8E:9D:1C:99:35:98:2F:73:A4:34:18:E3


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #1645: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags   -d ArmyOnlyDB     -t Navy.der - PASSED
chains.sh: Creating DB NavyOnlyDB
certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd
chains.sh: #1646: Bridge: Creating DB NavyOnlyDB  - PASSED
chains.sh: Importing certificate Navy.der to NavyOnlyDB database
certutil -A -n Navy  -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der
chains.sh: #1647: Bridge: Importing certificate Navy.der to NavyOnlyDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags   -d NavyOnlyDB    
vfychain -d NavyOnlyDB -pp -vv       UserBridge.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=User EE,O=User,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #1648: Bridge: Verifying certificate(s)  UserBridge.der with flags   -d NavyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags   -d NavyOnlyDB    
vfychain -d NavyOnlyDB -pp -vv       UserBridge.der BridgeArmy.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. bridge@army [Certificate Authority]:
Email Address(es): bridge@army
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Army ROOT CA,O=Army,C=US
Returned value is 1, expected result is fail
chains.sh: #1649: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags   -d NavyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags   -d NavyOnlyDB    
vfychain -d NavyOnlyDB -pp -vv       UserBridge.der BridgeArmy.der Army.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user.
    CN=Army ROOT CA,O=Army,C=US
Returned value is 1, expected result is fail
chains.sh: #1650: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags   -d NavyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags   -d NavyOnlyDB     -t Army.der
vfychain -d NavyOnlyDB -pp -vv       UserBridge.der BridgeArmy.der Army.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225548 (0x2422448c)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Mon Jun 06 22:55:49 2016
            Not After : Sun Jun 06 22:55:49 2066
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a9:65:99:d5:56:74:be:d9:9b:a9:92:8d:41:47:1a:7c:
                    d6:4a:f4:99:2d:9f:09:9a:75:b4:92:0a:02:f9:9a:c9:
                    fb:fb:65:64:77:16:4b:70:35:33:e4:26:a7:da:8f:de:
                    66:72:a8:34:cb:59:f2:21:f5:4d:4f:56:58:1d:d4:1d:
                    72:84:f1:03:b3:3d:29:e6:34:ac:58:e3:e9:d3:93:16:
                    1a:e0:e5:a7:2e:77:d6:49:1c:a0:53:5c:00:ed:bf:7d:
                    62:aa:ed:95:64:f7:f2:9d:8f:3e:84:03:28:16:4a:4b:
                    7b:c9:0b:43:33:be:1b:a7:74:e8:2f:4c:aa:7c:86:c9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        85:43:30:77:42:1e:94:77:34:23:48:72:2d:2c:3f:89:
        26:b8:ee:a2:57:46:8c:23:83:66:35:8b:94:a0:f6:b0:
        e7:ff:e3:09:53:b2:50:18:e2:25:aa:a1:db:24:9e:aa:
        c2:1c:78:bb:b3:64:d1:ca:7e:20:2f:e2:7d:f4:0f:50:
        07:97:9d:12:50:9c:8b:28:aa:31:88:e3:67:10:42:6a:
        23:20:55:01:9d:b9:aa:a9:92:8f:9b:3f:25:84:0a:88:
        5c:ac:56:30:90:16:35:ea:f1:3b:5b:ac:3a:8b:a5:5a:
        40:07:f7:fc:cf:2e:d9:f9:27:ed:51:8e:49:02:bc:48
    Fingerprint (MD5):
        D5:47:0F:C1:75:01:A8:3B:45:A6:83:A7:92:0F:7C:97
    Fingerprint (SHA1):
        55:B1:70:B6:7D:22:0E:A9:C0:B2:39:46:BD:60:7F:42:71:A1:2D:DF


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #1651: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags   -d NavyOnlyDB     -t Army.der - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags   -d NavyOnlyDB     -t Army.der
vfychain -d NavyOnlyDB -pp -vv       UserBridge.der BridgeArmy.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225548 (0x2422448c)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Mon Jun 06 22:55:49 2016
            Not After : Sun Jun 06 22:55:49 2066
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a9:65:99:d5:56:74:be:d9:9b:a9:92:8d:41:47:1a:7c:
                    d6:4a:f4:99:2d:9f:09:9a:75:b4:92:0a:02:f9:9a:c9:
                    fb:fb:65:64:77:16:4b:70:35:33:e4:26:a7:da:8f:de:
                    66:72:a8:34:cb:59:f2:21:f5:4d:4f:56:58:1d:d4:1d:
                    72:84:f1:03:b3:3d:29:e6:34:ac:58:e3:e9:d3:93:16:
                    1a:e0:e5:a7:2e:77:d6:49:1c:a0:53:5c:00:ed:bf:7d:
                    62:aa:ed:95:64:f7:f2:9d:8f:3e:84:03:28:16:4a:4b:
                    7b:c9:0b:43:33:be:1b:a7:74:e8:2f:4c:aa:7c:86:c9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        85:43:30:77:42:1e:94:77:34:23:48:72:2d:2c:3f:89:
        26:b8:ee:a2:57:46:8c:23:83:66:35:8b:94:a0:f6:b0:
        e7:ff:e3:09:53:b2:50:18:e2:25:aa:a1:db:24:9e:aa:
        c2:1c:78:bb:b3:64:d1:ca:7e:20:2f:e2:7d:f4:0f:50:
        07:97:9d:12:50:9c:8b:28:aa:31:88:e3:67:10:42:6a:
        23:20:55:01:9d:b9:aa:a9:92:8f:9b:3f:25:84:0a:88:
        5c:ac:56:30:90:16:35:ea:f1:3b:5b:ac:3a:8b:a5:5a:
        40:07:f7:fc:cf:2e:d9:f9:27:ed:51:8e:49:02:bc:48
    Fingerprint (MD5):
        D5:47:0F:C1:75:01:A8:3B:45:A6:83:A7:92:0F:7C:97
    Fingerprint (SHA1):
        55:B1:70:B6:7D:22:0E:A9:C0:B2:39:46:BD:60:7F:42:71:A1:2D:DF


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #1652: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags   -d NavyOnlyDB     -t Army.der - PASSED
chains.sh: Creating DB Root1DB
certutil -N -d Root1DB -f Root1DB/dbpasswd
chains.sh: #1653: MegaBridge_3_2: Creating DB Root1DB  - PASSED
chains.sh: Creating Root CA Root1
certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1  -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -m 606225553 < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #1654: MegaBridge_3_2: Creating Root CA Root1  - PASSED
chains.sh: Exporting Root CA Root1.der
certutil -L -d Root1DB -r -n Root1 -o Root1.der
chains.sh: #1655: MegaBridge_3_2: Exporting Root CA Root1.der  - PASSED
chains.sh: Creating DB Root2DB
certutil -N -d Root2DB -f Root2DB/dbpasswd
chains.sh: #1656: MegaBridge_3_2: Creating DB Root2DB  - PASSED
chains.sh: Creating Root CA Root2
certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2  -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -m 606225554 < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #1657: MegaBridge_3_2: Creating Root CA Root2  - PASSED
chains.sh: Exporting Root CA Root2.der
certutil -L -d Root2DB -r -n Root2 -o Root2.der
chains.sh: #1658: MegaBridge_3_2: Exporting Root CA Root2.der  - PASSED
chains.sh: Creating DB Root3DB
certutil -N -d Root3DB -f Root3DB/dbpasswd
chains.sh: #1659: MegaBridge_3_2: Creating DB Root3DB  - PASSED
chains.sh: Creating Root CA Root3
certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3  -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -m 606225555 < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #1660: MegaBridge_3_2: Creating Root CA Root3  - PASSED
chains.sh: Exporting Root CA Root3.der
certutil -L -d Root3DB -r -n Root3 -o Root3.der
chains.sh: #1661: MegaBridge_3_2: Exporting Root CA Root3.der  - PASSED
chains.sh: Creating DB Root4DB
certutil -N -d Root4DB -f Root4DB/dbpasswd
chains.sh: #1662: MegaBridge_3_2: Creating DB Root4DB  - PASSED
chains.sh: Creating Root CA Root4
certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4  -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -m 606225556 < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #1663: MegaBridge_3_2: Creating Root CA Root4  - PASSED
chains.sh: Exporting Root CA Root4.der
certutil -L -d Root4DB -r -n Root4 -o Root4.der
chains.sh: #1664: MegaBridge_3_2: Exporting Root CA Root4.der  - PASSED
chains.sh: Creating DB Root5DB
certutil -N -d Root5DB -f Root5DB/dbpasswd
chains.sh: #1665: MegaBridge_3_2: Creating DB Root5DB  - PASSED
chains.sh: Creating Root CA Root5
certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5  -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -m 606225557 < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #1666: MegaBridge_3_2: Creating Root CA Root5  - PASSED
chains.sh: Exporting Root CA Root5.der
certutil -L -d Root5DB -r -n Root5 -o Root5.der
chains.sh: #1667: MegaBridge_3_2: Exporting Root CA Root5.der  - PASSED
chains.sh: Creating DB Root6DB
certutil -N -d Root6DB -f Root6DB/dbpasswd
chains.sh: #1668: MegaBridge_3_2: Creating DB Root6DB  - PASSED
chains.sh: Creating Root CA Root6
certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6  -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -m 606225558 < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #1669: MegaBridge_3_2: Creating Root CA Root6  - PASSED
chains.sh: Exporting Root CA Root6.der
certutil -L -d Root6DB -r -n Root6 -o Root6.der
chains.sh: #1670: MegaBridge_3_2: Exporting Root CA Root6.der  - PASSED
chains.sh: Creating DB Root7DB
certutil -N -d Root7DB -f Root7DB/dbpasswd
chains.sh: #1671: MegaBridge_3_2: Creating DB Root7DB  - PASSED
chains.sh: Creating Root CA Root7
certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7  -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -m 606225559 < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #1672: MegaBridge_3_2: Creating Root CA Root7  - PASSED
chains.sh: Exporting Root CA Root7.der
certutil -L -d Root7DB -r -n Root7 -o Root7.der
chains.sh: #1673: MegaBridge_3_2: Exporting Root CA Root7.der  - PASSED
chains.sh: Creating DB Root8DB
certutil -N -d Root8DB -f Root8DB/dbpasswd
chains.sh: #1674: MegaBridge_3_2: Creating DB Root8DB  - PASSED
chains.sh: Creating Root CA Root8
certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8  -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -m 606225560 < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #1675: MegaBridge_3_2: Creating Root CA Root8  - PASSED
chains.sh: Exporting Root CA Root8.der
certutil -L -d Root8DB -r -n Root8 -o Root8.der
chains.sh: #1676: MegaBridge_3_2: Exporting Root CA Root8.der  - PASSED
chains.sh: Creating DB Root9DB
certutil -N -d Root9DB -f Root9DB/dbpasswd
chains.sh: #1677: MegaBridge_3_2: Creating DB Root9DB  - PASSED
chains.sh: Creating Root CA Root9
certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9  -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -m 606225561 < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #1678: MegaBridge_3_2: Creating Root CA Root9  - PASSED
chains.sh: Exporting Root CA Root9.der
certutil -L -d Root9DB -r -n Root9 -o Root9.der
chains.sh: #1679: MegaBridge_3_2: Exporting Root CA Root9.der  - PASSED
chains.sh: Creating DB Bridge11DB
certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd
chains.sh: #1680: MegaBridge_3_2: Creating DB Bridge11DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge11Req.der
certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US"  -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o Bridge11Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #1681: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der  - PASSED
chains.sh: Creating certficate Bridge11Root1.der signed by Root1
certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 606225562 -7 Bridge11@Root1  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #1682: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1  - PASSED
chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database
certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der
chains.sh: #1683: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database  - PASSED
chains.sh: Creating certficate Bridge11Root2.der signed by Root2
certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 606225563 -7 Bridge11@Root2  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #1684: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2  - PASSED
chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database
certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der
chains.sh: #1685: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database  - PASSED
chains.sh: Creating certficate Bridge11Root3.der signed by Root3
certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 606225564 -7 Bridge11@Root3  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #1686: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3  - PASSED
chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database
certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der
chains.sh: #1687: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge11DB database
cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7
chains.sh: #1688: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database  - PASSED
chains.sh: Creating DB Bridge12DB
certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd
chains.sh: #1689: MegaBridge_3_2: Creating DB Bridge12DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge12Req.der
certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US"  -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o Bridge12Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #1690: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der  - PASSED
chains.sh: Creating certficate Bridge12Root4.der signed by Root4
certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 606225565 -7 Bridge12@Root4  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #1691: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4  - PASSED
chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database
certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der
chains.sh: #1692: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database  - PASSED
chains.sh: Creating certficate Bridge12Root5.der signed by Root5
certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 606225566 -7 Bridge12@Root5  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #1693: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5  - PASSED
chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database
certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der
chains.sh: #1694: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database  - PASSED
chains.sh: Creating certficate Bridge12Root6.der signed by Root6
certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 606225567 -7 Bridge12@Root6  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #1695: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6  - PASSED
chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database
certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der
chains.sh: #1696: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge12DB database
cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7
chains.sh: #1697: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database  - PASSED
chains.sh: Creating DB Bridge13DB
certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd
chains.sh: #1698: MegaBridge_3_2: Creating DB Bridge13DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge13Req.der
certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US"  -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o Bridge13Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #1699: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der  - PASSED
chains.sh: Creating certficate Bridge13Root7.der signed by Root7
certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 606225568 -7 Bridge13@Root7  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #1700: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7  - PASSED
chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database
certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der
chains.sh: #1701: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database  - PASSED
chains.sh: Creating certficate Bridge13Root8.der signed by Root8
certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 606225569 -7 Bridge13@Root8  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #1702: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8  - PASSED
chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database
certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der
chains.sh: #1703: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database  - PASSED
chains.sh: Creating certficate Bridge13Root9.der signed by Root9
certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 606225570 -7 Bridge13@Root9  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #1704: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9  - PASSED
chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database
certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der
chains.sh: #1705: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge13DB database
cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7
chains.sh: #1706: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database  - PASSED
chains.sh: Creating DB Bridge21DB
certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd
chains.sh: #1707: MegaBridge_3_2: Creating DB Bridge21DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge21Req.der
certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US"  -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o Bridge21Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #1708: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der  - PASSED
chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11
certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 606225571 -7 Bridge21@Bridge11  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #1709: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11  - PASSED
chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database
certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der
chains.sh: #1710: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database  - PASSED
chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12
certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 606225572 -7 Bridge21@Bridge12  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #1711: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12  - PASSED
chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database
certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der
chains.sh: #1712: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database  - PASSED
chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13
certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 606225573 -7 Bridge21@Bridge13  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #1713: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13  - PASSED
chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database
certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der
chains.sh: #1714: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge21DB database
cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7
chains.sh: #1715: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #1716: MegaBridge_3_2: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #1717: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21
certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 606225574   < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #1718: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21  - PASSED
chains.sh: Importing certificate CA1Bridge21.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der
chains.sh: #1719: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #1720: MegaBridge_3_2: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o EE1Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #1721: MegaBridge_3_2: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 606225575   < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #1722: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #1723: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags   -d EE1DB     -t Root1.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der  -t Root1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225553 (0x24224491)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root1 ROOT CA,O=Root1,C=US"
        Validity:
            Not Before: Mon Jun 06 22:56:00 2016
            Not After : Sun Jun 06 22:56:00 2066
        Subject: "CN=Root1 ROOT CA,O=Root1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d3:36:78:6b:8e:a5:22:77:d8:da:8f:5c:27:a5:5f:04:
                    7d:8d:83:bc:f2:1c:9b:17:e2:3b:57:3f:75:f2:92:e4:
                    f4:8e:f3:91:38:5e:6a:12:ff:5f:5b:0f:2d:86:4e:4b:
                    31:6e:45:25:c4:c9:9d:92:e4:51:e0:96:61:d2:82:fc:
                    41:e8:b2:22:0e:18:47:1b:18:1a:2a:ad:07:05:ad:73:
                    ab:ad:d0:54:e0:5f:04:c5:4c:b9:f7:c1:ef:21:73:03:
                    b4:88:a7:0d:dd:3d:6d:b3:29:0f:65:42:63:2b:63:10:
                    58:21:ca:91:d4:ec:fb:df:4f:6b:e0:c0:dd:f2:7a:e1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        13:4e:63:af:3f:c8:36:82:14:fc:da:5a:b8:16:4b:83:
        3a:77:b0:26:6e:47:72:a2:71:41:76:93:c4:79:03:99:
        7c:21:0b:17:78:e8:fd:00:97:26:75:d7:fa:2a:02:c7:
        f6:86:fb:59:d3:b1:22:c6:52:89:36:a5:21:b6:23:f0:
        3a:91:49:2c:23:fa:dc:78:37:fe:b6:9c:8b:4e:cc:b1:
        74:b5:b6:4f:17:5a:f8:6d:e5:24:3e:ef:64:5a:8b:33:
        b6:78:03:ab:e2:df:29:4e:2b:8a:b8:65:8d:cc:a0:28:
        06:f2:e0:49:5e:32:3c:c5:e4:46:62:0b:3d:94:df:4d
    Fingerprint (MD5):
        B0:7D:EA:08:C4:0B:C2:B6:EE:EF:82:20:B3:A2:84:D3
    Fingerprint (SHA1):
        27:D1:F6:4D:F2:7F:53:A7:01:F5:4A:21:2A:AC:B0:58:7A:BB:AD:FC


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US"
Returned value is 0, expected result is pass
chains.sh: #1724: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags   -d EE1DB     -t Root1.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags   -d EE1DB     -t Root2.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der  -t Root2.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225554 (0x24224492)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root2 ROOT CA,O=Root2,C=US"
        Validity:
            Not Before: Mon Jun 06 22:56:02 2016
            Not After : Sun Jun 06 22:56:02 2066
        Subject: "CN=Root2 ROOT CA,O=Root2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ac:ed:34:53:2c:14:01:2b:e3:83:75:3e:03:25:58:03:
                    12:d3:f7:1c:6d:88:c1:26:af:58:7f:2f:b4:17:90:a4:
                    6f:a9:9b:49:29:d2:ad:72:ac:f6:ef:6c:57:ef:40:3d:
                    63:57:d8:01:04:d2:77:56:95:9d:e4:10:5a:65:b9:36:
                    43:45:b3:a7:21:ed:05:47:48:16:cc:96:18:e1:e2:b2:
                    d5:ab:24:8a:77:6d:1c:56:14:62:c4:9f:ea:da:ba:8d:
                    10:0f:a5:1b:df:ef:5b:cd:e8:9f:9f:88:df:c3:20:8f:
                    e1:42:76:d2:d9:58:73:ae:b2:6b:ef:c4:5a:02:dc:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        2e:77:69:22:22:97:83:89:0b:66:17:c7:42:6e:d4:98:
        3f:17:7c:2e:d6:92:11:fd:64:24:fb:8d:95:03:df:99:
        70:45:86:14:89:f7:de:99:5b:4a:3d:86:5a:44:88:0a:
        e4:24:bf:fe:38:c2:63:e5:6c:58:96:9f:01:db:63:b3:
        09:39:35:39:b7:22:6a:e4:f2:e5:82:35:56:3f:3a:9b:
        1c:b9:0e:14:6d:fd:78:a6:2f:85:5a:7b:ad:da:b3:cc:
        63:01:28:7c:1c:65:ec:9a:d2:d0:a1:f4:f2:62:a3:8f:
        8b:c2:9e:20:d5:56:7d:07:b5:14:0e:ea:a1:59:ab:93
    Fingerprint (MD5):
        60:0B:94:0F:F6:9C:61:4A:20:7C:7C:2E:3E:63:F6:F2
    Fingerprint (SHA1):
        B1:C7:39:47:4F:BD:46:5B:E2:D1:4E:A1:99:F3:78:7A:8A:FE:0B:C0


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US"
Returned value is 0, expected result is pass
chains.sh: #1725: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags   -d EE1DB     -t Root2.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags   -d EE1DB     -t Root3.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der  -t Root3.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225555 (0x24224493)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root3 ROOT CA,O=Root3,C=US"
        Validity:
            Not Before: Mon Jun 06 22:56:04 2016
            Not After : Sun Jun 06 22:56:04 2066
        Subject: "CN=Root3 ROOT CA,O=Root3,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c8:c1:29:2f:7a:20:0e:84:e0:7c:92:9a:43:df:1b:fa:
                    96:ae:3d:e9:23:3f:11:f2:da:9c:22:23:6f:a3:e6:ca:
                    7b:63:62:6a:b6:ae:e2:40:5c:0e:0f:9d:b1:2a:46:e2:
                    4f:43:d1:d1:a1:e7:9b:c7:b7:41:fd:ee:63:70:0c:26:
                    b0:2a:6a:75:98:5a:19:6d:70:34:70:2d:43:1c:36:cf:
                    07:27:2d:33:d1:fa:a5:10:02:f3:77:f1:fd:72:05:f1:
                    91:81:4f:1a:0b:36:3b:25:56:d7:aa:3d:53:de:c7:06:
                    75:ad:84:7c:ac:be:04:22:37:35:ca:73:ea:42:2e:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        45:c1:76:09:67:73:5f:78:1c:a3:88:b8:f2:be:ad:a0:
        32:eb:bd:a5:67:6a:ff:2b:cc:02:9d:af:9a:17:7d:c2:
        f1:83:28:5c:c4:2c:1b:5d:fb:61:9e:38:dc:df:c8:92:
        68:fa:45:6e:d8:3d:cf:cf:36:4a:60:e8:fb:02:88:9c:
        dc:81:a2:23:c2:07:d1:a7:75:70:b2:af:2c:1c:f3:d3:
        2b:5b:fe:25:ba:63:85:15:e2:45:fc:d6:81:fb:df:ab:
        aa:c5:19:d9:3c:78:a9:90:17:89:d8:e1:af:a5:c8:e6:
        6c:41:3f:4f:ed:2d:81:f1:6b:30:6d:ea:3d:76:65:a3
    Fingerprint (MD5):
        E7:21:A6:89:A3:05:95:6A:6A:8B:78:42:EB:9F:58:DF
    Fingerprint (SHA1):
        99:D0:88:B9:E7:2D:5D:C1:9A:4F:C6:50:42:63:1F:0E:FC:8D:0D:DA


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US"
Returned value is 0, expected result is pass
chains.sh: #1726: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags   -d EE1DB     -t Root3.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags   -d EE1DB     -t Root4.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der  -t Root4.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225556 (0x24224494)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root4 ROOT CA,O=Root4,C=US"
        Validity:
            Not Before: Mon Jun 06 22:56:05 2016
            Not After : Sun Jun 06 22:56:05 2066
        Subject: "CN=Root4 ROOT CA,O=Root4,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:3b:0b:59:09:5f:0b:ea:c0:79:c8:f8:91:6b:92:fb:
                    ad:05:2b:02:15:7f:09:86:07:89:ff:e6:61:c0:85:ed:
                    f2:37:0e:d7:b8:c9:38:98:82:46:80:81:99:69:27:70:
                    52:e3:ef:ae:e3:7e:00:c2:b8:19:99:30:90:eb:72:d5:
                    b5:69:00:9c:84:c5:0c:90:52:30:12:c2:38:83:ce:01:
                    ae:43:db:1d:97:ce:3e:d5:b9:f5:b8:3f:f7:79:42:1e:
                    3e:ae:eb:4a:27:24:43:a4:91:0a:82:e1:7c:be:23:22:
                    e3:72:19:5a:3e:18:b4:80:da:55:6c:3c:aa:8b:f8:d9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        90:eb:28:ba:9e:d3:ad:69:a9:58:88:c1:70:69:25:ad:
        9c:1c:f9:68:01:a6:fc:0e:dc:45:41:1f:9e:f6:73:fc:
        f3:48:36:07:4c:77:c5:50:db:86:45:07:72:cc:6e:0c:
        46:6c:97:ec:5c:34:a7:d2:57:34:67:24:04:6b:52:b6:
        ee:59:dc:de:6c:b9:5f:c2:f9:67:4f:fe:5a:23:1f:d1:
        e1:47:3d:01:fb:cb:d3:b9:df:06:a1:a8:bb:eb:4b:95:
        20:0e:de:cc:80:03:2f:00:7e:9d:07:64:26:19:0f:0a:
        7c:a4:d9:67:93:6f:6f:c9:6a:ab:fd:71:93:71:56:2b
    Fingerprint (MD5):
        22:66:5E:71:8E:5D:99:32:92:A4:C8:EF:6A:8F:6F:D3
    Fingerprint (SHA1):
        43:4F:A4:97:A5:B2:9D:82:5D:56:16:F1:2F:A6:4A:34:EC:4D:BF:C0


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US"
Returned value is 0, expected result is pass
chains.sh: #1727: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags   -d EE1DB     -t Root4.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags   -d EE1DB     -t Root5.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der  -t Root5.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225557 (0x24224495)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root5 ROOT CA,O=Root5,C=US"
        Validity:
            Not Before: Mon Jun 06 22:56:07 2016
            Not After : Sun Jun 06 22:56:07 2066
        Subject: "CN=Root5 ROOT CA,O=Root5,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:51:25:3c:c6:ea:58:e8:c7:46:6e:02:3d:07:cd:64:
                    41:de:01:7a:34:dd:61:ce:38:06:be:09:27:e8:ea:e7:
                    7c:14:04:e0:62:33:69:5b:d3:03:b1:77:bc:41:04:f1:
                    11:fc:e5:13:ba:08:49:55:43:1c:b4:21:1d:47:c0:dc:
                    19:4d:9e:db:56:ac:78:41:12:2d:08:87:a3:0d:c1:0c:
                    09:e5:f1:f2:a9:b4:2b:e7:77:6d:ab:64:6e:3e:0d:2a:
                    9c:90:87:48:e1:02:c5:79:b9:1b:c9:19:ac:83:3e:6d:
                    16:55:f6:3d:f1:db:b8:5a:87:35:47:bc:e8:26:55:dd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        0a:9e:43:0d:f2:fd:85:67:b4:ee:11:3d:20:5c:ff:24:
        4b:65:82:aa:05:96:74:45:10:1c:2d:a2:3c:8b:ce:79:
        9a:2c:f8:fc:ef:80:6f:cf:3d:5c:de:99:61:0e:38:73:
        75:60:06:ae:65:c0:45:3c:e1:fe:f7:30:3a:70:36:ce:
        dc:64:94:43:f1:30:73:d0:6c:67:ad:30:67:68:e5:bf:
        22:10:b3:a2:47:ee:4c:49:3d:9a:be:04:59:f4:7e:c9:
        b7:f7:f7:9d:50:89:05:c8:e2:5d:34:65:a4:16:21:dd:
        84:0e:50:99:f0:0a:23:9e:d6:7b:37:fd:e3:e8:31:eb
    Fingerprint (MD5):
        27:F9:FA:39:02:94:2F:4C:E1:29:F5:E7:DE:60:3A:03
    Fingerprint (SHA1):
        C3:BD:F4:EB:66:BD:4C:8E:0E:94:70:AF:8B:06:90:D4:EB:F6:58:C1


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US"
Returned value is 0, expected result is pass
chains.sh: #1728: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags   -d EE1DB     -t Root5.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags   -d EE1DB     -t Root6.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der  -t Root6.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225558 (0x24224496)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root6 ROOT CA,O=Root6,C=US"
        Validity:
            Not Before: Mon Jun 06 22:56:08 2016
            Not After : Sun Jun 06 22:56:08 2066
        Subject: "CN=Root6 ROOT CA,O=Root6,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d3:45:e1:c6:ac:12:7f:20:ee:64:de:e7:43:6a:e8:71:
                    e8:f9:42:9d:eb:a3:45:7c:30:c1:31:99:be:80:71:b2:
                    b5:2c:9d:d4:c3:91:dc:0c:5e:ec:50:7a:13:43:4f:a1:
                    90:dd:7a:47:50:fc:90:63:fd:ef:59:9d:b8:07:20:66:
                    8e:a9:7e:cb:90:28:6f:50:3d:94:46:5c:e0:b9:dc:6e:
                    9f:9f:6a:e7:e4:46:c9:4f:9d:c5:fe:96:ed:39:fc:36:
                    40:63:c0:22:e5:bf:b7:93:52:6b:2d:38:0f:cc:ee:96:
                    1b:da:07:10:51:b7:5c:09:05:21:08:c3:9f:d2:5c:e3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c3:21:f4:af:7f:8c:d5:7b:f5:f9:77:47:bf:c2:bd:06:
        c4:a7:fc:6b:66:22:f2:03:32:9d:72:ef:6d:11:4b:2d:
        a2:2a:c8:30:4d:62:de:85:45:6d:e6:00:94:8a:4f:ee:
        0d:7a:43:71:8e:c0:78:30:68:01:3c:4a:37:c0:53:58:
        3d:ff:12:cd:0a:ce:66:e9:38:7b:39:75:5a:2d:76:6c:
        f2:1a:1e:17:bf:6b:33:eb:eb:ad:2d:be:13:b9:db:cc:
        92:00:9c:a8:d3:fc:b1:1f:ac:d2:5b:6d:04:a6:20:47:
        7f:e6:79:97:eb:bb:76:c0:51:63:e4:c7:15:04:4c:e2
    Fingerprint (MD5):
        4A:66:FF:97:A6:8B:CD:4E:19:10:23:A7:18:C8:B9:23
    Fingerprint (SHA1):
        ED:3D:9D:C3:15:A8:E9:E3:73:B0:4D:E2:E9:56:DF:30:31:21:E1:91


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US"
Returned value is 0, expected result is pass
chains.sh: #1729: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags   -d EE1DB     -t Root6.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags   -d EE1DB     -t Root7.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der  -t Root7.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225559 (0x24224497)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root7 ROOT CA,O=Root7,C=US"
        Validity:
            Not Before: Mon Jun 06 22:56:10 2016
            Not After : Sun Jun 06 22:56:10 2066
        Subject: "CN=Root7 ROOT CA,O=Root7,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a8:7d:78:44:71:58:92:29:03:79:f6:82:2a:52:2e:0b:
                    32:0f:62:ba:6a:2b:a9:ae:9d:6f:0e:ee:d3:51:2c:2e:
                    91:be:59:1c:e8:e2:2b:4b:bf:9a:5a:52:1c:b7:67:5f:
                    30:97:54:72:1a:07:6e:c1:34:96:82:c1:44:15:17:03:
                    5d:2a:c3:f8:21:49:50:68:e0:5b:8a:84:02:0f:24:6b:
                    e0:1a:bb:68:5c:f9:d3:dd:db:e3:a9:2a:94:43:d2:f7:
                    7e:c7:7f:80:32:4d:65:bf:0a:9d:b3:b5:d0:34:87:15:
                    41:82:43:f7:a0:2b:04:57:39:a3:03:c4:00:4b:bc:17
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        85:5a:fc:79:5f:b2:16:57:8e:47:b0:e9:6a:c4:89:f8:
        5e:55:d9:e8:39:fd:0a:06:9c:49:b6:8a:2d:f1:d8:5c:
        ef:d3:9f:51:e8:55:48:b9:40:fc:e9:82:4f:6b:9c:e4:
        a6:57:c2:16:d7:25:80:74:e7:4e:83:1c:ca:87:aa:c1:
        d7:37:be:ca:e8:45:49:1d:93:f9:5a:a1:2a:d0:0f:0c:
        89:75:87:70:dd:d3:86:1a:48:a4:f5:30:e0:87:a4:c2:
        54:19:4e:54:47:b4:fb:75:78:a6:82:2a:62:52:d6:c8:
        c0:54:b4:9b:08:03:51:8a:a0:46:6a:09:97:15:10:19
    Fingerprint (MD5):
        3F:DC:3B:6C:E9:6D:7B:A9:AB:60:8A:76:CD:EB:9D:D5
    Fingerprint (SHA1):
        FE:BE:1D:C9:BE:21:43:E9:34:B8:3C:7F:90:F8:6B:5F:50:01:E4:74


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US"
Returned value is 0, expected result is pass
chains.sh: #1730: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags   -d EE1DB     -t Root7.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags   -d EE1DB     -t Root8.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der  -t Root8.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225560 (0x24224498)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root8 ROOT CA,O=Root8,C=US"
        Validity:
            Not Before: Mon Jun 06 22:56:10 2016
            Not After : Sun Jun 06 22:56:10 2066
        Subject: "CN=Root8 ROOT CA,O=Root8,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d8:c5:38:16:44:c6:67:15:e2:09:51:04:50:83:03:46:
                    35:48:3d:9b:6c:1c:c4:28:ef:46:2c:ef:5f:df:9a:65:
                    2d:5c:c2:9d:a8:d8:fa:05:d5:35:4a:e8:b3:96:8d:1f:
                    d2:55:e8:02:06:df:04:f7:20:a8:c5:75:90:c2:a0:f7:
                    1a:56:8d:13:7f:6e:a4:2c:18:96:3f:22:bc:f4:bf:e7:
                    8a:ca:9b:3b:9b:fe:93:60:cb:60:c5:3f:95:a8:12:a6:
                    0f:13:dc:b9:2b:2a:87:b2:cd:66:a8:b5:cb:02:b1:9e:
                    e8:b4:6a:65:d8:0f:f7:0d:dc:52:5f:45:dc:13:cc:15
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        88:5e:32:fd:46:11:ea:fd:56:01:1e:55:7b:5b:97:1a:
        d3:09:da:52:be:13:06:b8:85:f7:0b:fc:9e:40:44:e4:
        b6:28:6e:11:d2:94:1e:91:c0:73:b7:fa:04:15:75:cf:
        6a:dd:7b:12:6c:a3:27:21:89:26:dc:44:f0:fc:5b:b2:
        24:a6:ae:22:78:de:cd:ef:dd:08:05:4d:93:6d:e9:b6:
        06:b5:dd:b9:bb:be:ab:db:30:1c:86:60:24:f6:1a:5e:
        7c:af:ac:ba:ce:0d:4e:b1:2b:6d:0b:e5:7a:d0:1a:8d:
        c6:93:76:5e:6d:35:62:49:88:d0:f5:7c:bb:94:6e:28
    Fingerprint (MD5):
        AE:DD:6D:91:C9:77:E2:A8:5A:6B:87:8D:64:25:63:22
    Fingerprint (SHA1):
        AC:62:F2:A9:BE:FB:4D:B4:BD:E8:88:5E:F9:6D:E1:48:C4:68:2F:AA


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US"
Returned value is 0, expected result is pass
chains.sh: #1731: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags   -d EE1DB     -t Root8.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags   -d EE1DB     -t Root9.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der  -t Root9.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225561 (0x24224499)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root9 ROOT CA,O=Root9,C=US"
        Validity:
            Not Before: Mon Jun 06 22:56:12 2016
            Not After : Sun Jun 06 22:56:12 2066
        Subject: "CN=Root9 ROOT CA,O=Root9,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:0e:a5:3e:01:d9:ef:df:a7:59:a7:a0:19:d1:6c:95:
                    b1:e9:fd:42:1c:fa:c1:09:c0:7b:80:b2:d7:c7:68:a3:
                    94:61:b0:c4:27:fb:5a:09:8a:1d:62:09:39:78:db:b8:
                    0a:77:d8:85:6a:d0:c4:c9:4c:7d:b9:4b:ae:c9:a3:d1:
                    39:65:5d:32:b7:9d:c1:93:fa:d9:64:80:be:0f:ff:18:
                    88:08:be:6a:4a:f6:b6:d5:62:82:50:9e:67:f7:64:78:
                    13:5c:f7:e0:08:e0:b9:b4:91:e2:b8:b1:c1:3d:d9:35:
                    d8:b8:b2:12:4b:c0:29:85:8b:d2:69:76:bc:3d:e0:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        70:f5:26:a1:49:c5:9a:a7:d7:d2:fc:14:b4:67:ff:94:
        0c:df:2b:98:6e:52:7b:f2:d0:46:11:05:6a:16:af:e5:
        d4:c1:c3:9b:8a:f9:6e:58:56:18:ba:37:75:51:08:2a:
        39:fc:ce:06:56:89:07:b4:cd:77:b0:2c:0c:b4:0f:71:
        75:85:e3:14:e9:16:5e:22:91:73:19:d7:7a:81:f0:3f:
        3a:db:d3:61:c1:2d:f5:08:af:82:80:11:30:95:78:a4:
        4a:45:53:85:32:67:43:3f:66:2b:00:be:5d:44:2f:02:
        84:ef:01:09:13:26:65:0d:ba:88:cb:c0:fd:f1:69:47
    Fingerprint (MD5):
        34:26:85:F8:2B:B7:A9:0D:E5:D6:E5:D7:1E:14:38:22
    Fingerprint (SHA1):
        92:92:CE:1A:9E:E1:A7:DC:AD:04:67:F6:42:92:75:1F:51:8C:80:75


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US"
Returned value is 0, expected result is pass
chains.sh: #1732: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags   -d EE1DB     -t Root9.der - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #1733: Extension: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -m 606225576 < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #1734: Extension: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #1735: Extension: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #1736: Extension: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #1737: Extension: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 606225577   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #1738: Extension: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #1739: Extension: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #1740: Extension: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #1741: Extension: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 606225578   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #1742: Extension: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #1743: Extension: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #1744: Extension: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o UserReq.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #1745: Extension: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 606225579   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #1746: Extension: Creating certficate UserCA2.der signed by CA2  - PASSED
chains.sh: Importing certificate UserCA2.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der
chains.sh: #1747: Extension: Importing certificate UserCA2.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #1748: Extension: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags   -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225576 (0x242244a8)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Mon Jun 06 22:56:29 2016
            Not After : Sun Jun 06 22:56:29 2066
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:e3:a2:21:33:ee:6a:74:d8:95:74:9b:0e:1e:5a:f2:
                    39:f7:99:88:44:87:03:87:3b:08:fc:3e:b3:f3:81:31:
                    67:9f:34:ed:b9:00:e9:2c:c9:79:c0:a9:eb:ee:b9:94:
                    e8:1f:7d:6d:1b:f3:e1:d3:44:50:e7:eb:1e:3f:d2:9b:
                    fa:b2:39:b5:ae:df:ce:0e:7a:aa:5c:b7:83:a9:33:d1:
                    42:bf:69:8b:f3:22:c2:bf:96:58:98:1e:94:b5:02:ab:
                    a1:9e:1d:e8:47:e8:04:89:0e:c0:4d:b9:99:88:35:59:
                    9c:65:57:75:1f:a5:47:05:44:c3:ac:9e:15:12:36:3d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        68:91:d5:ec:29:5d:26:b6:36:79:11:35:6f:6e:a2:82:
        05:37:6d:c4:e2:77:eb:3e:09:72:ed:9f:fc:6d:5a:94:
        44:3c:ee:7c:43:33:28:a3:a3:14:bd:6e:99:5f:48:b6:
        26:55:f8:1f:88:81:76:85:ad:60:67:a4:d9:8c:c3:51:
        2f:e2:0c:97:89:77:4c:c6:51:c4:ca:4c:77:5e:65:cb:
        ee:17:16:f7:66:5c:02:cf:18:7f:8a:5d:c1:de:b0:a7:
        be:c9:c8:5d:f3:c5:9e:12:55:e3:b9:2e:35:40:30:99:
        4d:a2:e1:3f:a1:d8:ea:22:39:be:8b:38:1e:1e:e3:99
    Fingerprint (MD5):
        B8:00:19:FC:4D:FD:25:38:28:C5:9F:87:F3:AD:E5:51
    Fingerprint (SHA1):
        BC:74:AA:8C:DF:07:77:23:7A:2D:1A:9F:14:71:3E:46:5F:5B:18:9D


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #1749: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags   -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags   -d AllDB    -o OID.2.0  -t Root.der
vfychain -d AllDB -pp -vv      -o OID.2.0  UserCA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #1750: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags   -d AllDB    -o OID.2.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags   -d AllDB    -o OID.1.0  -t CA1Root.der
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225577 (0x242244a9)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Mon Jun 06 22:56:30 2016
            Not After : Sun Jun 06 22:56:30 2021
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:dd:bd:95:f3:d3:2c:d5:54:e8:79:ef:58:30:59:00:
                    52:37:4c:1c:35:30:4e:68:06:f8:56:4d:1c:d5:01:30:
                    92:d1:11:f5:ae:ee:a3:95:c8:7d:3e:90:f8:de:67:98:
                    9d:0b:d6:5b:c9:3b:e1:60:dc:d9:01:3c:f4:da:16:47:
                    f7:85:64:cc:e1:56:b2:2a:46:56:cd:5f:61:6e:94:76:
                    e9:4e:41:29:58:45:ba:4d:50:87:91:fe:9b:fb:74:79:
                    56:fe:72:af:da:56:f0:fb:1c:1a:06:3e:b7:39:95:09:
                    97:53:74:45:c4:93:bd:20:1a:32:73:78:4a:c6:82:a9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6c:48:f8:22:ae:72:af:5d:5c:8d:75:a5:ed:32:55:88:
        fc:2b:58:cd:b5:b7:38:84:fe:1c:0f:fa:d2:83:8e:da:
        c4:37:c8:5c:5f:9e:d5:a9:67:82:5d:3e:1c:91:88:3c:
        fe:80:44:72:e7:12:12:82:9a:24:43:7f:35:43:57:80:
        22:e2:0a:dd:8d:92:91:9c:bd:d3:91:38:42:ef:58:6f:
        34:5d:6f:31:30:5b:0c:59:3c:de:5f:a6:2d:44:8f:e3:
        25:69:37:48:30:66:1f:e4:a2:c9:9f:4c:b3:4d:fc:e7:
        3f:e6:fb:e0:38:b4:9a:06:32:a8:95:91:ba:a8:85:0c
    Fingerprint (MD5):
        E2:04:94:D4:47:94:C7:D9:1F:CB:2B:0F:68:B1:97:E6
    Fingerprint (SHA1):
        B8:CF:B2:56:8E:AC:80:D6:29:E0:7A:8C:6A:39:11:1C:02:6B:AA:F3


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #1751: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags   -d AllDB    -o OID.1.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags   -d AllDB    -o OID.2.0  -t CA1Root.der
vfychain -d AllDB -pp -vv      -o OID.2.0  UserCA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #1752: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags   -d AllDB    -o OID.2.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags   -d AllDB    -o OID.1.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA2.der CA2CA1.der  -t CA2CA1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225578 (0x242244aa)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Mon Jun 06 22:56:31 2016
            Not After : Sun Jun 06 22:56:31 2021
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e5:f0:1b:62:e5:eb:2d:7e:24:80:e5:11:99:c3:8b:7c:
                    1f:7f:30:41:f4:a1:f8:5c:2a:2c:41:6f:4a:ca:3a:0b:
                    db:8d:df:4f:a6:b6:89:e2:2f:fa:7e:8d:89:70:d6:21:
                    f6:89:1e:66:7a:23:23:96:45:fb:d8:f5:22:39:3d:c4:
                    1f:a5:26:af:09:7f:b0:c6:da:84:05:96:de:59:5f:b8:
                    56:18:18:77:dc:22:84:d7:58:a5:48:24:2c:1d:aa:33:
                    67:8f:ec:8f:91:3a:cd:70:b8:c1:8a:62:b4:e0:68:f0:
                    fd:fc:68:78:e8:41:69:67:4e:66:17:18:5f:d7:ad:e7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        0f:3f:f5:17:c0:df:d4:de:8e:88:ef:29:49:3b:c7:81:
        79:d3:3c:37:ac:67:69:58:32:23:a0:99:5a:7c:d6:9f:
        7d:d8:a5:11:61:57:ca:40:f5:63:08:2a:2a:1a:a2:af:
        af:06:02:40:29:81:3f:35:2f:75:f2:46:b4:ea:07:ec:
        57:d3:3b:57:48:f1:86:7e:ab:d5:41:14:b8:14:00:7f:
        dc:2c:6e:13:3b:e1:07:cf:12:f5:7b:d7:22:3e:20:6a:
        af:59:2e:19:34:00:d1:6e:5f:aa:31:4d:9b:55:eb:34:
        f8:05:b1:08:9a:0c:65:e6:57:63:60:96:7d:d4:d7:a9
    Fingerprint (MD5):
        77:8D:4D:B1:62:41:EB:61:73:1F:7D:08:9B:40:61:E1
    Fingerprint (SHA1):
        F6:A0:9F:02:4D:08:36:9B:7E:19:D4:C9:97:1B:91:41:E3:0F:A3:9B


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Returned value is 0, expected result is pass
chains.sh: #1753: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags   -d AllDB    -o OID.1.0  -t CA2CA1.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags   -d AllDB    -o OID.2.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv      -o OID.2.0  UserCA2.der CA2CA1.der  -t CA2CA1.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #1754: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags   -d AllDB    -o OID.2.0  -t CA2CA1.der - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #1755: Extension: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #1756: Extension: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #1757: Extension: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags   -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225576 (0x242244a8)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Mon Jun 06 22:56:29 2016
            Not After : Sun Jun 06 22:56:29 2066
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:e3:a2:21:33:ee:6a:74:d8:95:74:9b:0e:1e:5a:f2:
                    39:f7:99:88:44:87:03:87:3b:08:fc:3e:b3:f3:81:31:
                    67:9f:34:ed:b9:00:e9:2c:c9:79:c0:a9:eb:ee:b9:94:
                    e8:1f:7d:6d:1b:f3:e1:d3:44:50:e7:eb:1e:3f:d2:9b:
                    fa:b2:39:b5:ae:df:ce:0e:7a:aa:5c:b7:83:a9:33:d1:
                    42:bf:69:8b:f3:22:c2:bf:96:58:98:1e:94:b5:02:ab:
                    a1:9e:1d:e8:47:e8:04:89:0e:c0:4d:b9:99:88:35:59:
                    9c:65:57:75:1f:a5:47:05:44:c3:ac:9e:15:12:36:3d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        68:91:d5:ec:29:5d:26:b6:36:79:11:35:6f:6e:a2:82:
        05:37:6d:c4:e2:77:eb:3e:09:72:ed:9f:fc:6d:5a:94:
        44:3c:ee:7c:43:33:28:a3:a3:14:bd:6e:99:5f:48:b6:
        26:55:f8:1f:88:81:76:85:ad:60:67:a4:d9:8c:c3:51:
        2f:e2:0c:97:89:77:4c:c6:51:c4:ca:4c:77:5e:65:cb:
        ee:17:16:f7:66:5c:02:cf:18:7f:8a:5d:c1:de:b0:a7:
        be:c9:c8:5d:f3:c5:9e:12:55:e3:b9:2e:35:40:30:99:
        4d:a2:e1:3f:a1:d8:ea:22:39:be:8b:38:1e:1e:e3:99
    Fingerprint (MD5):
        B8:00:19:FC:4D:FD:25:38:28:C5:9F:87:F3:AD:E5:51
    Fingerprint (SHA1):
        BC:74:AA:8C:DF:07:77:23:7A:2D:1A:9F:14:71:3E:46:5F:5B:18:9D

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #1758: Extension: Verifying certificate(s)  UserCA2.der with flags   -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags   -d AllDB    -o OID.2.0  -t Root
vfychain -d AllDB -pp -vv      -o OID.2.0  UserCA2.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #1759: Extension: Verifying certificate(s)  UserCA2.der with flags   -d AllDB    -o OID.2.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags   -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225577 (0x242244a9)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Mon Jun 06 22:56:30 2016
            Not After : Sun Jun 06 22:56:30 2021
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:dd:bd:95:f3:d3:2c:d5:54:e8:79:ef:58:30:59:00:
                    52:37:4c:1c:35:30:4e:68:06:f8:56:4d:1c:d5:01:30:
                    92:d1:11:f5:ae:ee:a3:95:c8:7d:3e:90:f8:de:67:98:
                    9d:0b:d6:5b:c9:3b:e1:60:dc:d9:01:3c:f4:da:16:47:
                    f7:85:64:cc:e1:56:b2:2a:46:56:cd:5f:61:6e:94:76:
                    e9:4e:41:29:58:45:ba:4d:50:87:91:fe:9b:fb:74:79:
                    56:fe:72:af:da:56:f0:fb:1c:1a:06:3e:b7:39:95:09:
                    97:53:74:45:c4:93:bd:20:1a:32:73:78:4a:c6:82:a9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6c:48:f8:22:ae:72:af:5d:5c:8d:75:a5:ed:32:55:88:
        fc:2b:58:cd:b5:b7:38:84:fe:1c:0f:fa:d2:83:8e:da:
        c4:37:c8:5c:5f:9e:d5:a9:67:82:5d:3e:1c:91:88:3c:
        fe:80:44:72:e7:12:12:82:9a:24:43:7f:35:43:57:80:
        22:e2:0a:dd:8d:92:91:9c:bd:d3:91:38:42:ef:58:6f:
        34:5d:6f:31:30:5b:0c:59:3c:de:5f:a6:2d:44:8f:e3:
        25:69:37:48:30:66:1f:e4:a2:c9:9f:4c:b3:4d:fc:e7:
        3f:e6:fb:e0:38:b4:9a:06:32:a8:95:91:ba:a8:85:0c
    Fingerprint (MD5):
        E2:04:94:D4:47:94:C7:D9:1F:CB:2B:0F:68:B1:97:E6
    Fingerprint (SHA1):
        B8:CF:B2:56:8E:AC:80:D6:29:E0:7A:8C:6A:39:11:1C:02:6B:AA:F3

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #1760: Extension: Verifying certificate(s)  UserCA2.der with flags   -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags   -d AllDB    -o OID.2.0  -t CA1
vfychain -d AllDB -pp -vv      -o OID.2.0  UserCA2.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #1761: Extension: Verifying certificate(s)  UserCA2.der with flags   -d AllDB    -o OID.2.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags   -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225578 (0x242244aa)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Mon Jun 06 22:56:31 2016
            Not After : Sun Jun 06 22:56:31 2021
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e5:f0:1b:62:e5:eb:2d:7e:24:80:e5:11:99:c3:8b:7c:
                    1f:7f:30:41:f4:a1:f8:5c:2a:2c:41:6f:4a:ca:3a:0b:
                    db:8d:df:4f:a6:b6:89:e2:2f:fa:7e:8d:89:70:d6:21:
                    f6:89:1e:66:7a:23:23:96:45:fb:d8:f5:22:39:3d:c4:
                    1f:a5:26:af:09:7f:b0:c6:da:84:05:96:de:59:5f:b8:
                    56:18:18:77:dc:22:84:d7:58:a5:48:24:2c:1d:aa:33:
                    67:8f:ec:8f:91:3a:cd:70:b8:c1:8a:62:b4:e0:68:f0:
                    fd:fc:68:78:e8:41:69:67:4e:66:17:18:5f:d7:ad:e7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        0f:3f:f5:17:c0:df:d4:de:8e:88:ef:29:49:3b:c7:81:
        79:d3:3c:37:ac:67:69:58:32:23:a0:99:5a:7c:d6:9f:
        7d:d8:a5:11:61:57:ca:40:f5:63:08:2a:2a:1a:a2:af:
        af:06:02:40:29:81:3f:35:2f:75:f2:46:b4:ea:07:ec:
        57:d3:3b:57:48:f1:86:7e:ab:d5:41:14:b8:14:00:7f:
        dc:2c:6e:13:3b:e1:07:cf:12:f5:7b:d7:22:3e:20:6a:
        af:59:2e:19:34:00:d1:6e:5f:aa:31:4d:9b:55:eb:34:
        f8:05:b1:08:9a:0c:65:e6:57:63:60:96:7d:d4:d7:a9
    Fingerprint (MD5):
        77:8D:4D:B1:62:41:EB:61:73:1F:7D:08:9B:40:61:E1
    Fingerprint (SHA1):
        F6:A0:9F:02:4D:08:36:9B:7E:19:D4:C9:97:1B:91:41:E3:0F:A3:9B

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Returned value is 0, expected result is pass
chains.sh: #1762: Extension: Verifying certificate(s)  UserCA2.der with flags   -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags   -d AllDB    -o OID.2.0  -t CA2
vfychain -d AllDB -pp -vv      -o OID.2.0  UserCA2.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #1763: Extension: Verifying certificate(s)  UserCA2.der with flags   -d AllDB    -o OID.2.0  -t CA2 - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #1764: Extension2: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -m 606225580 < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #1765: Extension2: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #1766: Extension2: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #1767: Extension2: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #1768: Extension2: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 606225581   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #1769: Extension2: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #1770: Extension2: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #1771: Extension2: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #1772: Extension2: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 606225582   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #1773: Extension2: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #1774: Extension2: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB User1DB
certutil -N -d User1DB -f User1DB/dbpasswd
chains.sh: #1775: Extension2: Creating DB User1DB  - PASSED
chains.sh: Creating EE certifiate request User1Req.der
certutil -s "CN=User1 EE, O=User1, C=US"  -R  -d User1DB -f User1DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o User1Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #1776: Extension2: Creating EE certifiate request User1Req.der  - PASSED
chains.sh: Creating certficate User1CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 606225583   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #1777: Extension2: Creating certficate User1CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User1CA2.der to User1DB database
certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der
chains.sh: #1778: Extension2: Importing certificate User1CA2.der to User1DB database  - PASSED
chains.sh: Creating DB User2DB
certutil -N -d User2DB -f User2DB/dbpasswd
chains.sh: #1779: Extension2: Creating DB User2DB  - PASSED
chains.sh: Creating EE certifiate request User2Req.der
certutil -s "CN=User2 EE, O=User2, C=US"  -R  -d User2DB -f User2DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o User2Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #1780: Extension2: Creating EE certifiate request User2Req.der  - PASSED
chains.sh: Creating certficate User2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 606225584   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #1781: Extension2: Creating certficate User2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User2CA2.der to User2DB database
certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der
chains.sh: #1782: Extension2: Importing certificate User2CA2.der to User2DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #1783: Extension2: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags   -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv      -o OID.1.0  User1CA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225580 (0x242244ac)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Mon Jun 06 22:56:36 2016
            Not After : Sun Jun 06 22:56:36 2066
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d3:c1:b8:d5:c5:72:7a:37:b8:2f:3f:97:89:70:89:63:
                    06:fe:24:26:57:0f:03:52:66:ef:8a:38:52:0a:46:f6:
                    9b:e0:19:c0:03:8c:11:c1:8e:2a:d7:35:b0:42:41:44:
                    c7:33:56:09:66:f8:d5:3a:e0:e3:3d:ea:4a:4a:05:e3:
                    78:80:3a:d2:fd:6e:cc:17:d0:7e:98:04:10:cc:ef:f1:
                    c2:55:0b:41:2e:1e:5f:9a:61:86:48:f7:1b:70:5a:96:
                    c3:1f:b9:f2:41:3e:ab:c0:12:2b:68:b6:f9:37:0f:0e:
                    5f:8b:60:9e:b5:fe:fa:f4:45:fb:54:32:92:26:3e:3d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ba:37:d1:57:52:58:72:91:a8:ea:5b:d4:76:40:40:72:
        65:ba:c7:95:fc:d1:69:27:c7:ba:a5:70:66:cb:f0:1a:
        5e:e9:0e:46:56:0d:09:20:41:e5:39:89:7c:bd:f6:c1:
        a8:c5:95:35:6b:e9:ce:e3:2d:f0:75:70:67:6f:91:ed:
        8e:40:2f:13:d8:74:d6:af:e5:aa:b8:e8:dd:43:a8:d7:
        b9:10:99:f8:e1:d3:cc:7e:10:ad:1d:d2:c6:14:ac:6d:
        6c:96:37:87:1b:4a:4c:ea:2b:b3:a3:23:62:7d:f6:a4:
        8a:5f:16:67:ee:5f:b4:c7:8f:31:53:81:7a:90:4f:54
    Fingerprint (MD5):
        3C:0F:EE:B0:71:82:11:D0:96:8C:59:7F:B4:3F:07:40
    Fingerprint (SHA1):
        A0:6D:D9:5B:26:86:95:EF:DD:50:2B:E1:6F:EC:EB:B4:82:7D:1D:53


Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #1784: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags   -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags   -d AllDB    -o OID.2.0  -t Root.der
vfychain -d AllDB -pp -vv      -o OID.2.0  User1CA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #1785: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags   -d AllDB    -o OID.2.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags   -d AllDB    -o OID.1.0  -t CA1Root.der
vfychain -d AllDB -pp -vv      -o OID.1.0  User1CA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225581 (0x242244ad)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Mon Jun 06 22:56:37 2016
            Not After : Sun Jun 06 22:56:37 2021
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ef:62:c2:d2:69:9e:74:76:af:39:70:ea:d5:88:e0:79:
                    b9:c6:08:d9:7a:7b:6f:56:c5:65:67:f1:f4:6f:6f:07:
                    c6:36:da:41:b9:65:19:bc:ea:b7:39:8b:40:e0:2f:ef:
                    e0:7f:f6:af:ad:5b:4b:7c:7e:60:63:02:a3:8c:40:43:
                    8d:d5:09:4a:c4:68:fa:d7:b9:34:15:cf:19:b8:77:b0:
                    0e:d8:cf:26:d0:01:85:8c:4d:07:c6:b8:af:7b:a9:7c:
                    2b:25:61:ad:07:1b:9e:db:1e:19:26:b5:e2:40:d6:8a:
                    75:35:74:bb:16:79:5b:98:78:9d:57:3e:ae:46:80:13
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        a1:ef:41:7c:28:af:e9:36:b1:ba:73:b9:8b:6e:bb:98:
        fd:51:f1:ce:24:e0:ef:93:0d:16:a3:71:cd:38:0f:8f:
        8b:0a:3f:2e:4e:1f:99:6e:75:5f:29:0f:f1:70:3f:8d:
        81:99:23:4d:50:bd:40:a5:34:de:ed:0c:7c:0f:a1:89:
        f5:c0:94:d5:a5:d3:17:76:1a:78:49:b5:32:24:eb:69:
        c3:d6:fc:c8:f5:ef:03:d6:8b:49:eb:69:f7:7e:f9:80:
        fe:76:70:c6:f8:2d:fa:61:fb:15:49:f8:c5:22:95:88:
        30:75:f2:b8:80:3e:de:28:b1:19:7d:d6:13:ae:4c:2f
    Fingerprint (MD5):
        78:5D:8A:84:E1:99:B1:B2:1C:77:9B:AE:73:4F:A6:3A
    Fingerprint (SHA1):
        55:6D:F0:14:87:A3:51:92:CD:1E:4F:57:47:45:95:DE:73:EA:D7:B1


Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #1786: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags   -d AllDB    -o OID.1.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags   -d AllDB    -o OID.2.0  -t CA1Root.der
vfychain -d AllDB -pp -vv      -o OID.2.0  User1CA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #1787: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags   -d AllDB    -o OID.2.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags   -d AllDB    -o OID.1.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv      -o OID.1.0  User1CA2.der CA2CA1.der  -t CA2CA1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225582 (0x242244ae)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Mon Jun 06 22:56:38 2016
            Not After : Sun Jun 06 22:56:38 2021
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d1:f3:db:ff:ca:95:27:34:b2:9f:ef:93:af:db:58:d3:
                    4b:8b:68:44:bb:33:04:9c:32:23:4b:f2:f5:9c:2a:f2:
                    1c:6d:b9:de:62:3f:c7:10:ed:11:d5:91:77:47:87:d3:
                    9f:c5:6a:ad:0e:c4:f0:1b:9f:29:a8:25:a8:62:14:83:
                    49:67:b6:8b:ea:33:58:91:49:97:3a:de:d2:e5:fe:8a:
                    80:c9:c1:8a:ab:1c:24:e6:50:0e:e9:74:8c:72:73:e3:
                    65:da:89:e8:5f:bc:08:3f:62:c9:16:c3:ec:aa:a6:7f:
                    e2:17:f3:70:a7:6e:68:7b:43:0f:13:b8:43:e6:82:f1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        e6:01:2c:ca:0c:02:fd:d0:13:da:ff:b6:fe:c4:79:7f:
        9c:89:93:96:e6:41:53:95:ec:36:7d:33:5e:6d:88:1f:
        f0:f3:87:a9:6d:9f:92:97:44:ae:e8:63:5d:ee:26:c1:
        8c:4e:20:a2:cd:77:3d:81:5d:98:3a:6c:93:b5:2c:6a:
        74:20:dd:d6:d4:a9:c5:e8:be:49:d2:cd:b5:22:fb:73:
        6f:24:7d:bd:9c:58:50:a8:9e:d6:37:bc:36:b7:5a:e7:
        77:2a:31:1d:88:7e:6b:b7:19:0d:36:52:39:99:e1:cf:
        d9:38:34:f5:b3:91:79:fc:b6:25:d7:00:9e:aa:e0:b6
    Fingerprint (MD5):
        E0:48:8F:6A:24:42:B2:FB:85:7C:0D:AB:0E:1C:DB:3A
    Fingerprint (SHA1):
        58:15:A4:C2:94:39:EA:67:F4:29:13:A1:B4:65:68:8F:56:9E:8A:7E


Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Returned value is 0, expected result is pass
chains.sh: #1788: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags   -d AllDB    -o OID.1.0  -t CA2CA1.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags   -d AllDB    -o OID.2.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv      -o OID.2.0  User1CA2.der CA2CA1.der  -t CA2CA1.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #1789: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags   -d AllDB    -o OID.2.0  -t CA2CA1.der - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #1790: Extension2: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #1791: Extension2: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #1792: Extension2: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags   -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv      -o OID.1.0  User1CA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225580 (0x242244ac)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Mon Jun 06 22:56:36 2016
            Not After : Sun Jun 06 22:56:36 2066
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d3:c1:b8:d5:c5:72:7a:37:b8:2f:3f:97:89:70:89:63:
                    06:fe:24:26:57:0f:03:52:66:ef:8a:38:52:0a:46:f6:
                    9b:e0:19:c0:03:8c:11:c1:8e:2a:d7:35:b0:42:41:44:
                    c7:33:56:09:66:f8:d5:3a:e0:e3:3d:ea:4a:4a:05:e3:
                    78:80:3a:d2:fd:6e:cc:17:d0:7e:98:04:10:cc:ef:f1:
                    c2:55:0b:41:2e:1e:5f:9a:61:86:48:f7:1b:70:5a:96:
                    c3:1f:b9:f2:41:3e:ab:c0:12:2b:68:b6:f9:37:0f:0e:
                    5f:8b:60:9e:b5:fe:fa:f4:45:fb:54:32:92:26:3e:3d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ba:37:d1:57:52:58:72:91:a8:ea:5b:d4:76:40:40:72:
        65:ba:c7:95:fc:d1:69:27:c7:ba:a5:70:66:cb:f0:1a:
        5e:e9:0e:46:56:0d:09:20:41:e5:39:89:7c:bd:f6:c1:
        a8:c5:95:35:6b:e9:ce:e3:2d:f0:75:70:67:6f:91:ed:
        8e:40:2f:13:d8:74:d6:af:e5:aa:b8:e8:dd:43:a8:d7:
        b9:10:99:f8:e1:d3:cc:7e:10:ad:1d:d2:c6:14:ac:6d:
        6c:96:37:87:1b:4a:4c:ea:2b:b3:a3:23:62:7d:f6:a4:
        8a:5f:16:67:ee:5f:b4:c7:8f:31:53:81:7a:90:4f:54
    Fingerprint (MD5):
        3C:0F:EE:B0:71:82:11:D0:96:8C:59:7F:B4:3F:07:40
    Fingerprint (SHA1):
        A0:6D:D9:5B:26:86:95:EF:DD:50:2B:E1:6F:EC:EB:B4:82:7D:1D:53

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #1793: Extension2: Verifying certificate(s)  User1CA2.der with flags   -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags   -d AllDB    -o OID.2.0  -t Root
vfychain -d AllDB -pp -vv      -o OID.2.0  User1CA2.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #1794: Extension2: Verifying certificate(s)  User1CA2.der with flags   -d AllDB    -o OID.2.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags   -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv      -o OID.1.0  User1CA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225581 (0x242244ad)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Mon Jun 06 22:56:37 2016
            Not After : Sun Jun 06 22:56:37 2021
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ef:62:c2:d2:69:9e:74:76:af:39:70:ea:d5:88:e0:79:
                    b9:c6:08:d9:7a:7b:6f:56:c5:65:67:f1:f4:6f:6f:07:
                    c6:36:da:41:b9:65:19:bc:ea:b7:39:8b:40:e0:2f:ef:
                    e0:7f:f6:af:ad:5b:4b:7c:7e:60:63:02:a3:8c:40:43:
                    8d:d5:09:4a:c4:68:fa:d7:b9:34:15:cf:19:b8:77:b0:
                    0e:d8:cf:26:d0:01:85:8c:4d:07:c6:b8:af:7b:a9:7c:
                    2b:25:61:ad:07:1b:9e:db:1e:19:26:b5:e2:40:d6:8a:
                    75:35:74:bb:16:79:5b:98:78:9d:57:3e:ae:46:80:13
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        a1:ef:41:7c:28:af:e9:36:b1:ba:73:b9:8b:6e:bb:98:
        fd:51:f1:ce:24:e0:ef:93:0d:16:a3:71:cd:38:0f:8f:
        8b:0a:3f:2e:4e:1f:99:6e:75:5f:29:0f:f1:70:3f:8d:
        81:99:23:4d:50:bd:40:a5:34:de:ed:0c:7c:0f:a1:89:
        f5:c0:94:d5:a5:d3:17:76:1a:78:49:b5:32:24:eb:69:
        c3:d6:fc:c8:f5:ef:03:d6:8b:49:eb:69:f7:7e:f9:80:
        fe:76:70:c6:f8:2d:fa:61:fb:15:49:f8:c5:22:95:88:
        30:75:f2:b8:80:3e:de:28:b1:19:7d:d6:13:ae:4c:2f
    Fingerprint (MD5):
        78:5D:8A:84:E1:99:B1:B2:1C:77:9B:AE:73:4F:A6:3A
    Fingerprint (SHA1):
        55:6D:F0:14:87:A3:51:92:CD:1E:4F:57:47:45:95:DE:73:EA:D7:B1

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #1795: Extension2: Verifying certificate(s)  User1CA2.der with flags   -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags   -d AllDB    -o OID.2.0  -t CA1
vfychain -d AllDB -pp -vv      -o OID.2.0  User1CA2.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #1796: Extension2: Verifying certificate(s)  User1CA2.der with flags   -d AllDB    -o OID.2.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags   -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv      -o OID.1.0  User1CA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225582 (0x242244ae)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Mon Jun 06 22:56:38 2016
            Not After : Sun Jun 06 22:56:38 2021
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d1:f3:db:ff:ca:95:27:34:b2:9f:ef:93:af:db:58:d3:
                    4b:8b:68:44:bb:33:04:9c:32:23:4b:f2:f5:9c:2a:f2:
                    1c:6d:b9:de:62:3f:c7:10:ed:11:d5:91:77:47:87:d3:
                    9f:c5:6a:ad:0e:c4:f0:1b:9f:29:a8:25:a8:62:14:83:
                    49:67:b6:8b:ea:33:58:91:49:97:3a:de:d2:e5:fe:8a:
                    80:c9:c1:8a:ab:1c:24:e6:50:0e:e9:74:8c:72:73:e3:
                    65:da:89:e8:5f:bc:08:3f:62:c9:16:c3:ec:aa:a6:7f:
                    e2:17:f3:70:a7:6e:68:7b:43:0f:13:b8:43:e6:82:f1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        e6:01:2c:ca:0c:02:fd:d0:13:da:ff:b6:fe:c4:79:7f:
        9c:89:93:96:e6:41:53:95:ec:36:7d:33:5e:6d:88:1f:
        f0:f3:87:a9:6d:9f:92:97:44:ae:e8:63:5d:ee:26:c1:
        8c:4e:20:a2:cd:77:3d:81:5d:98:3a:6c:93:b5:2c:6a:
        74:20:dd:d6:d4:a9:c5:e8:be:49:d2:cd:b5:22:fb:73:
        6f:24:7d:bd:9c:58:50:a8:9e:d6:37:bc:36:b7:5a:e7:
        77:2a:31:1d:88:7e:6b:b7:19:0d:36:52:39:99:e1:cf:
        d9:38:34:f5:b3:91:79:fc:b6:25:d7:00:9e:aa:e0:b6
    Fingerprint (MD5):
        E0:48:8F:6A:24:42:B2:FB:85:7C:0D:AB:0E:1C:DB:3A
    Fingerprint (SHA1):
        58:15:A4:C2:94:39:EA:67:F4:29:13:A1:B4:65:68:8F:56:9E:8A:7E

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Returned value is 0, expected result is pass
chains.sh: #1797: Extension2: Verifying certificate(s)  User1CA2.der with flags   -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags   -d AllDB    -o OID.2.0  -t CA2
vfychain -d AllDB -pp -vv      -o OID.2.0  User1CA2.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #1798: Extension2: Verifying certificate(s)  User1CA2.der with flags   -d AllDB    -o OID.2.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags   -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv      -o OID.1.0  User2CA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225580 (0x242244ac)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Mon Jun 06 22:56:36 2016
            Not After : Sun Jun 06 22:56:36 2066
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d3:c1:b8:d5:c5:72:7a:37:b8:2f:3f:97:89:70:89:63:
                    06:fe:24:26:57:0f:03:52:66:ef:8a:38:52:0a:46:f6:
                    9b:e0:19:c0:03:8c:11:c1:8e:2a:d7:35:b0:42:41:44:
                    c7:33:56:09:66:f8:d5:3a:e0:e3:3d:ea:4a:4a:05:e3:
                    78:80:3a:d2:fd:6e:cc:17:d0:7e:98:04:10:cc:ef:f1:
                    c2:55:0b:41:2e:1e:5f:9a:61:86:48:f7:1b:70:5a:96:
                    c3:1f:b9:f2:41:3e:ab:c0:12:2b:68:b6:f9:37:0f:0e:
                    5f:8b:60:9e:b5:fe:fa:f4:45:fb:54:32:92:26:3e:3d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ba:37:d1:57:52:58:72:91:a8:ea:5b:d4:76:40:40:72:
        65:ba:c7:95:fc:d1:69:27:c7:ba:a5:70:66:cb:f0:1a:
        5e:e9:0e:46:56:0d:09:20:41:e5:39:89:7c:bd:f6:c1:
        a8:c5:95:35:6b:e9:ce:e3:2d:f0:75:70:67:6f:91:ed:
        8e:40:2f:13:d8:74:d6:af:e5:aa:b8:e8:dd:43:a8:d7:
        b9:10:99:f8:e1:d3:cc:7e:10:ad:1d:d2:c6:14:ac:6d:
        6c:96:37:87:1b:4a:4c:ea:2b:b3:a3:23:62:7d:f6:a4:
        8a:5f:16:67:ee:5f:b4:c7:8f:31:53:81:7a:90:4f:54
    Fingerprint (MD5):
        3C:0F:EE:B0:71:82:11:D0:96:8C:59:7F:B4:3F:07:40
    Fingerprint (SHA1):
        A0:6D:D9:5B:26:86:95:EF:DD:50:2B:E1:6F:EC:EB:B4:82:7D:1D:53

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #1799: Extension2: Verifying certificate(s)  User2CA2.der with flags   -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags   -d AllDB    -o OID.2.0  -t Root
vfychain -d AllDB -pp -vv      -o OID.2.0  User2CA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225580 (0x242244ac)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Mon Jun 06 22:56:36 2016
            Not After : Sun Jun 06 22:56:36 2066
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d3:c1:b8:d5:c5:72:7a:37:b8:2f:3f:97:89:70:89:63:
                    06:fe:24:26:57:0f:03:52:66:ef:8a:38:52:0a:46:f6:
                    9b:e0:19:c0:03:8c:11:c1:8e:2a:d7:35:b0:42:41:44:
                    c7:33:56:09:66:f8:d5:3a:e0:e3:3d:ea:4a:4a:05:e3:
                    78:80:3a:d2:fd:6e:cc:17:d0:7e:98:04:10:cc:ef:f1:
                    c2:55:0b:41:2e:1e:5f:9a:61:86:48:f7:1b:70:5a:96:
                    c3:1f:b9:f2:41:3e:ab:c0:12:2b:68:b6:f9:37:0f:0e:
                    5f:8b:60:9e:b5:fe:fa:f4:45:fb:54:32:92:26:3e:3d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ba:37:d1:57:52:58:72:91:a8:ea:5b:d4:76:40:40:72:
        65:ba:c7:95:fc:d1:69:27:c7:ba:a5:70:66:cb:f0:1a:
        5e:e9:0e:46:56:0d:09:20:41:e5:39:89:7c:bd:f6:c1:
        a8:c5:95:35:6b:e9:ce:e3:2d:f0:75:70:67:6f:91:ed:
        8e:40:2f:13:d8:74:d6:af:e5:aa:b8:e8:dd:43:a8:d7:
        b9:10:99:f8:e1:d3:cc:7e:10:ad:1d:d2:c6:14:ac:6d:
        6c:96:37:87:1b:4a:4c:ea:2b:b3:a3:23:62:7d:f6:a4:
        8a:5f:16:67:ee:5f:b4:c7:8f:31:53:81:7a:90:4f:54
    Fingerprint (MD5):
        3C:0F:EE:B0:71:82:11:D0:96:8C:59:7F:B4:3F:07:40
    Fingerprint (SHA1):
        A0:6D:D9:5B:26:86:95:EF:DD:50:2B:E1:6F:EC:EB:B4:82:7D:1D:53

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #1800: Extension2: Verifying certificate(s)  User2CA2.der with flags   -d AllDB    -o OID.2.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags   -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv      -o OID.1.0  User2CA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225581 (0x242244ad)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Mon Jun 06 22:56:37 2016
            Not After : Sun Jun 06 22:56:37 2021
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ef:62:c2:d2:69:9e:74:76:af:39:70:ea:d5:88:e0:79:
                    b9:c6:08:d9:7a:7b:6f:56:c5:65:67:f1:f4:6f:6f:07:
                    c6:36:da:41:b9:65:19:bc:ea:b7:39:8b:40:e0:2f:ef:
                    e0:7f:f6:af:ad:5b:4b:7c:7e:60:63:02:a3:8c:40:43:
                    8d:d5:09:4a:c4:68:fa:d7:b9:34:15:cf:19:b8:77:b0:
                    0e:d8:cf:26:d0:01:85:8c:4d:07:c6:b8:af:7b:a9:7c:
                    2b:25:61:ad:07:1b:9e:db:1e:19:26:b5:e2:40:d6:8a:
                    75:35:74:bb:16:79:5b:98:78:9d:57:3e:ae:46:80:13
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        a1:ef:41:7c:28:af:e9:36:b1:ba:73:b9:8b:6e:bb:98:
        fd:51:f1:ce:24:e0:ef:93:0d:16:a3:71:cd:38:0f:8f:
        8b:0a:3f:2e:4e:1f:99:6e:75:5f:29:0f:f1:70:3f:8d:
        81:99:23:4d:50:bd:40:a5:34:de:ed:0c:7c:0f:a1:89:
        f5:c0:94:d5:a5:d3:17:76:1a:78:49:b5:32:24:eb:69:
        c3:d6:fc:c8:f5:ef:03:d6:8b:49:eb:69:f7:7e:f9:80:
        fe:76:70:c6:f8:2d:fa:61:fb:15:49:f8:c5:22:95:88:
        30:75:f2:b8:80:3e:de:28:b1:19:7d:d6:13:ae:4c:2f
    Fingerprint (MD5):
        78:5D:8A:84:E1:99:B1:B2:1C:77:9B:AE:73:4F:A6:3A
    Fingerprint (SHA1):
        55:6D:F0:14:87:A3:51:92:CD:1E:4F:57:47:45:95:DE:73:EA:D7:B1

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #1801: Extension2: Verifying certificate(s)  User2CA2.der with flags   -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags   -d AllDB    -o OID.2.0  -t CA1
vfychain -d AllDB -pp -vv      -o OID.2.0  User2CA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225581 (0x242244ad)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Mon Jun 06 22:56:37 2016
            Not After : Sun Jun 06 22:56:37 2021
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ef:62:c2:d2:69:9e:74:76:af:39:70:ea:d5:88:e0:79:
                    b9:c6:08:d9:7a:7b:6f:56:c5:65:67:f1:f4:6f:6f:07:
                    c6:36:da:41:b9:65:19:bc:ea:b7:39:8b:40:e0:2f:ef:
                    e0:7f:f6:af:ad:5b:4b:7c:7e:60:63:02:a3:8c:40:43:
                    8d:d5:09:4a:c4:68:fa:d7:b9:34:15:cf:19:b8:77:b0:
                    0e:d8:cf:26:d0:01:85:8c:4d:07:c6:b8:af:7b:a9:7c:
                    2b:25:61:ad:07:1b:9e:db:1e:19:26:b5:e2:40:d6:8a:
                    75:35:74:bb:16:79:5b:98:78:9d:57:3e:ae:46:80:13
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        a1:ef:41:7c:28:af:e9:36:b1:ba:73:b9:8b:6e:bb:98:
        fd:51:f1:ce:24:e0:ef:93:0d:16:a3:71:cd:38:0f:8f:
        8b:0a:3f:2e:4e:1f:99:6e:75:5f:29:0f:f1:70:3f:8d:
        81:99:23:4d:50:bd:40:a5:34:de:ed:0c:7c:0f:a1:89:
        f5:c0:94:d5:a5:d3:17:76:1a:78:49:b5:32:24:eb:69:
        c3:d6:fc:c8:f5:ef:03:d6:8b:49:eb:69:f7:7e:f9:80:
        fe:76:70:c6:f8:2d:fa:61:fb:15:49:f8:c5:22:95:88:
        30:75:f2:b8:80:3e:de:28:b1:19:7d:d6:13:ae:4c:2f
    Fingerprint (MD5):
        78:5D:8A:84:E1:99:B1:B2:1C:77:9B:AE:73:4F:A6:3A
    Fingerprint (SHA1):
        55:6D:F0:14:87:A3:51:92:CD:1E:4F:57:47:45:95:DE:73:EA:D7:B1

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #1802: Extension2: Verifying certificate(s)  User2CA2.der with flags   -d AllDB    -o OID.2.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags   -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv      -o OID.1.0  User2CA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225582 (0x242244ae)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Mon Jun 06 22:56:38 2016
            Not After : Sun Jun 06 22:56:38 2021
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d1:f3:db:ff:ca:95:27:34:b2:9f:ef:93:af:db:58:d3:
                    4b:8b:68:44:bb:33:04:9c:32:23:4b:f2:f5:9c:2a:f2:
                    1c:6d:b9:de:62:3f:c7:10:ed:11:d5:91:77:47:87:d3:
                    9f:c5:6a:ad:0e:c4:f0:1b:9f:29:a8:25:a8:62:14:83:
                    49:67:b6:8b:ea:33:58:91:49:97:3a:de:d2:e5:fe:8a:
                    80:c9:c1:8a:ab:1c:24:e6:50:0e:e9:74:8c:72:73:e3:
                    65:da:89:e8:5f:bc:08:3f:62:c9:16:c3:ec:aa:a6:7f:
                    e2:17:f3:70:a7:6e:68:7b:43:0f:13:b8:43:e6:82:f1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        e6:01:2c:ca:0c:02:fd:d0:13:da:ff:b6:fe:c4:79:7f:
        9c:89:93:96:e6:41:53:95:ec:36:7d:33:5e:6d:88:1f:
        f0:f3:87:a9:6d:9f:92:97:44:ae:e8:63:5d:ee:26:c1:
        8c:4e:20:a2:cd:77:3d:81:5d:98:3a:6c:93:b5:2c:6a:
        74:20:dd:d6:d4:a9:c5:e8:be:49:d2:cd:b5:22:fb:73:
        6f:24:7d:bd:9c:58:50:a8:9e:d6:37:bc:36:b7:5a:e7:
        77:2a:31:1d:88:7e:6b:b7:19:0d:36:52:39:99:e1:cf:
        d9:38:34:f5:b3:91:79:fc:b6:25:d7:00:9e:aa:e0:b6
    Fingerprint (MD5):
        E0:48:8F:6A:24:42:B2:FB:85:7C:0D:AB:0E:1C:DB:3A
    Fingerprint (SHA1):
        58:15:A4:C2:94:39:EA:67:F4:29:13:A1:B4:65:68:8F:56:9E:8A:7E

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Returned value is 0, expected result is pass
chains.sh: #1803: Extension2: Verifying certificate(s)  User2CA2.der with flags   -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags   -d AllDB    -o OID.2.0  -t CA2
vfychain -d AllDB -pp -vv      -o OID.2.0  User2CA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225582 (0x242244ae)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Mon Jun 06 22:56:38 2016
            Not After : Sun Jun 06 22:56:38 2021
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d1:f3:db:ff:ca:95:27:34:b2:9f:ef:93:af:db:58:d3:
                    4b:8b:68:44:bb:33:04:9c:32:23:4b:f2:f5:9c:2a:f2:
                    1c:6d:b9:de:62:3f:c7:10:ed:11:d5:91:77:47:87:d3:
                    9f:c5:6a:ad:0e:c4:f0:1b:9f:29:a8:25:a8:62:14:83:
                    49:67:b6:8b:ea:33:58:91:49:97:3a:de:d2:e5:fe:8a:
                    80:c9:c1:8a:ab:1c:24:e6:50:0e:e9:74:8c:72:73:e3:
                    65:da:89:e8:5f:bc:08:3f:62:c9:16:c3:ec:aa:a6:7f:
                    e2:17:f3:70:a7:6e:68:7b:43:0f:13:b8:43:e6:82:f1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        e6:01:2c:ca:0c:02:fd:d0:13:da:ff:b6:fe:c4:79:7f:
        9c:89:93:96:e6:41:53:95:ec:36:7d:33:5e:6d:88:1f:
        f0:f3:87:a9:6d:9f:92:97:44:ae:e8:63:5d:ee:26:c1:
        8c:4e:20:a2:cd:77:3d:81:5d:98:3a:6c:93:b5:2c:6a:
        74:20:dd:d6:d4:a9:c5:e8:be:49:d2:cd:b5:22:fb:73:
        6f:24:7d:bd:9c:58:50:a8:9e:d6:37:bc:36:b7:5a:e7:
        77:2a:31:1d:88:7e:6b:b7:19:0d:36:52:39:99:e1:cf:
        d9:38:34:f5:b3:91:79:fc:b6:25:d7:00:9e:aa:e0:b6
    Fingerprint (MD5):
        E0:48:8F:6A:24:42:B2:FB:85:7C:0D:AB:0E:1C:DB:3A
    Fingerprint (SHA1):
        58:15:A4:C2:94:39:EA:67:F4:29:13:A1:B4:65:68:8F:56:9E:8A:7E

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Returned value is 0, expected result is pass
chains.sh: #1804: Extension2: Verifying certificate(s)  User2CA2.der with flags   -d AllDB    -o OID.2.0  -t CA2 - PASSED
chains.sh: Creating DB RootCADB
certutil -N -d RootCADB -f RootCADB/dbpasswd
chains.sh: #1805: AnyPolicy: Creating DB RootCADB  - PASSED
chains.sh: Creating Root CA RootCA
certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA  -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -m 606225585 < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #1806: AnyPolicy: Creating Root CA RootCA  - PASSED
chains.sh: Exporting Root CA RootCA.der
certutil -L -d RootCADB -r -n RootCA -o RootCA.der
chains.sh: #1807: AnyPolicy: Exporting Root CA RootCA.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #1808: AnyPolicy: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #1809: AnyPolicy: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 606225586   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #1810: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA1RootCA.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der
chains.sh: #1811: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #1812: AnyPolicy: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #1813: AnyPolicy: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 606225587   --extCP --extIA < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n
0
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #1814: AnyPolicy: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #1815: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB CA3DB
certutil -N -d CA3DB -f CA3DB/dbpasswd
chains.sh: #1816: AnyPolicy: Creating DB CA3DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA3Req.der
certutil -s "CN=CA3 Intermediate, O=CA3, C=US"  -R -2 -d CA3DB -f CA3DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA3Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #1817: AnyPolicy: Creating Intermediate certifiate request CA3Req.der  - PASSED
chains.sh: Creating certficate CA3CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 606225588   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #1818: AnyPolicy: Creating certficate CA3CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA3CA1.der to CA3DB database
certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der
chains.sh: #1819: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database  - PASSED
chains.sh: Creating DB User1DB
certutil -N -d User1DB -f User1DB/dbpasswd
chains.sh: #1820: AnyPolicy: Creating DB User1DB  - PASSED
chains.sh: Creating EE certifiate request User1Req.der
certutil -s "CN=User1 EE, O=User1, C=US"  -R  -d User1DB -f User1DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o User1Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #1821: AnyPolicy: Creating EE certifiate request User1Req.der  - PASSED
chains.sh: Creating certficate User1CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 606225589   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #1822: AnyPolicy: Creating certficate User1CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User1CA2.der to User1DB database
certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der
chains.sh: #1823: AnyPolicy: Importing certificate User1CA2.der to User1DB database  - PASSED
chains.sh: Creating DB User2DB
certutil -N -d User2DB -f User2DB/dbpasswd
chains.sh: #1824: AnyPolicy: Creating DB User2DB  - PASSED
chains.sh: Creating EE certifiate request User2Req.der
certutil -s "CN=User2 EE, O=User2, C=US"  -R  -d User2DB -f User2DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o User2Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #1825: AnyPolicy: Creating EE certifiate request User2Req.der  - PASSED
chains.sh: Creating certficate User2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 606225590   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #1826: AnyPolicy: Creating certficate User2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User2CA2.der to User2DB database
certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der
chains.sh: #1827: AnyPolicy: Importing certificate User2CA2.der to User2DB database  - PASSED
chains.sh: Creating DB User3DB
certutil -N -d User3DB -f User3DB/dbpasswd
chains.sh: #1828: AnyPolicy: Creating DB User3DB  - PASSED
chains.sh: Creating EE certifiate request User3Req.der
certutil -s "CN=User3 EE, O=User3, C=US"  -R  -d User3DB -f User3DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o User3Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #1829: AnyPolicy: Creating EE certifiate request User3Req.der  - PASSED
chains.sh: Creating certficate User3CA3.der signed by CA3
certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 606225591   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #1830: AnyPolicy: Creating certficate User3CA3.der signed by CA3  - PASSED
chains.sh: Importing certificate User3CA3.der to User3DB database
certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der
chains.sh: #1831: AnyPolicy: Importing certificate User3CA3.der to User3DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #1832: AnyPolicy: Creating DB AllDB  - PASSED
chains.sh: Importing certificate RootCA.der to AllDB database
certutil -A -n RootCA  -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der
chains.sh: #1833: AnyPolicy: Importing certificate RootCA.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1RootCA.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der
chains.sh: #1834: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #1835: AnyPolicy: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Importing certificate CA3CA1.der to AllDB database
certutil -A -n CA3  -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der
chains.sh: #1836: AnyPolicy: Importing certificate CA3CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags   -d AllDB    -o OID.1.0  -t RootCA
vfychain -d AllDB -pp -vv      -o OID.1.0  User1CA2.der  -t RootCA
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225585 (0x242244b1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Mon Jun 06 22:56:48 2016
            Not After : Sun Jun 06 22:56:48 2066
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:41:6b:c3:6e:73:6f:60:ed:6e:51:6d:74:f4:1d:af:
                    af:a0:6a:73:91:6f:a8:e7:15:23:1e:ee:85:b4:6a:53:
                    6b:31:7e:0a:cf:ea:22:20:53:c2:09:64:75:0a:0b:d7:
                    28:8d:16:bd:bb:ce:35:86:a0:a8:6f:53:28:f7:db:81:
                    2d:a2:d4:5d:c1:9c:4b:db:64:6f:68:22:59:8a:63:18:
                    6a:f2:ae:45:93:46:52:4c:74:5c:de:46:c7:e6:e5:d4:
                    79:1f:33:8b:6f:86:8c:fe:69:f4:5e:31:fc:71:20:09:
                    c5:fa:21:f5:6e:37:bb:1b:fa:62:83:b6:26:ce:b5:93
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        4b:97:db:dd:72:8b:c9:0a:b5:73:43:38:38:2e:9c:75:
        83:53:35:1b:d8:da:7d:88:db:8c:b2:4e:d2:c7:2e:64:
        4c:4b:11:b8:85:8b:bd:f1:f7:4d:1b:ec:0a:22:43:2d:
        87:9c:1b:ca:b8:b4:9b:c8:86:a4:84:f1:5e:a0:b1:53:
        01:e9:44:ce:03:05:af:0d:88:35:b4:fd:26:28:16:e3:
        87:a0:dd:10:b7:68:b9:a4:64:96:54:dc:13:bd:23:27:
        3a:d7:5d:9f:b0:51:e1:8b:95:dd:6f:db:44:6b:0f:4c:
        3c:06:47:a6:85:f6:c2:da:17:30:99:c5:9b:91:03:3b
    Fingerprint (MD5):
        67:01:8A:22:4C:6A:AA:70:86:60:F5:E4:E7:FD:BE:AD
    Fingerprint (SHA1):
        2D:64:4D:61:DD:C2:48:65:82:21:90:15:B9:F3:72:FE:BD:44:32:F6

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #1837: AnyPolicy: Verifying certificate(s)  User1CA2.der with flags   -d AllDB    -o OID.1.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags   -d AllDB    -o OID.2.0  -t RootCA
vfychain -d AllDB -pp -vv      -o OID.2.0  User1CA2.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #1838: AnyPolicy: Verifying certificate(s)  User1CA2.der with flags   -d AllDB    -o OID.2.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags   -d AllDB    -o OID.1.0  -t RootCA
vfychain -d AllDB -pp -vv      -o OID.1.0  User2CA2.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #1839: AnyPolicy: Verifying certificate(s)  User2CA2.der with flags   -d AllDB    -o OID.1.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags   -d AllDB    -o OID.2.0  -t RootCA
vfychain -d AllDB -pp -vv      -o OID.2.0  User2CA2.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #1840: AnyPolicy: Verifying certificate(s)  User2CA2.der with flags   -d AllDB    -o OID.2.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User3CA3.der with flags   -d AllDB    -o OID.1.0  -t RootCA
vfychain -d AllDB -pp -vv      -o OID.1.0  User3CA3.der  -t RootCA
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225585 (0x242244b1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Mon Jun 06 22:56:48 2016
            Not After : Sun Jun 06 22:56:48 2066
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:41:6b:c3:6e:73:6f:60:ed:6e:51:6d:74:f4:1d:af:
                    af:a0:6a:73:91:6f:a8:e7:15:23:1e:ee:85:b4:6a:53:
                    6b:31:7e:0a:cf:ea:22:20:53:c2:09:64:75:0a:0b:d7:
                    28:8d:16:bd:bb:ce:35:86:a0:a8:6f:53:28:f7:db:81:
                    2d:a2:d4:5d:c1:9c:4b:db:64:6f:68:22:59:8a:63:18:
                    6a:f2:ae:45:93:46:52:4c:74:5c:de:46:c7:e6:e5:d4:
                    79:1f:33:8b:6f:86:8c:fe:69:f4:5e:31:fc:71:20:09:
                    c5:fa:21:f5:6e:37:bb:1b:fa:62:83:b6:26:ce:b5:93
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        4b:97:db:dd:72:8b:c9:0a:b5:73:43:38:38:2e:9c:75:
        83:53:35:1b:d8:da:7d:88:db:8c:b2:4e:d2:c7:2e:64:
        4c:4b:11:b8:85:8b:bd:f1:f7:4d:1b:ec:0a:22:43:2d:
        87:9c:1b:ca:b8:b4:9b:c8:86:a4:84:f1:5e:a0:b1:53:
        01:e9:44:ce:03:05:af:0d:88:35:b4:fd:26:28:16:e3:
        87:a0:dd:10:b7:68:b9:a4:64:96:54:dc:13:bd:23:27:
        3a:d7:5d:9f:b0:51:e1:8b:95:dd:6f:db:44:6b:0f:4c:
        3c:06:47:a6:85:f6:c2:da:17:30:99:c5:9b:91:03:3b
    Fingerprint (MD5):
        67:01:8A:22:4C:6A:AA:70:86:60:F5:E4:E7:FD:BE:AD
    Fingerprint (SHA1):
        2D:64:4D:61:DD:C2:48:65:82:21:90:15:B9:F3:72:FE:BD:44:32:F6

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User3 EE,O=User3,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #1841: AnyPolicy: Verifying certificate(s)  User3CA3.der with flags   -d AllDB    -o OID.1.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User3CA3.der with flags   -d AllDB    -o OID.2.0  -t RootCA
vfychain -d AllDB -pp -vv      -o OID.2.0  User3CA3.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #1842: AnyPolicy: Verifying certificate(s)  User3CA3.der with flags   -d AllDB    -o OID.2.0  -t RootCA - PASSED
chains.sh: Creating DB RootCADB
certutil -N -d RootCADB -f RootCADB/dbpasswd
chains.sh: #1843: AnyPolicyWithLevel: Creating DB RootCADB  - PASSED
chains.sh: Creating Root CA RootCA
certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA  -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -m 606225592 < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #1844: AnyPolicyWithLevel: Creating Root CA RootCA  - PASSED
chains.sh: Exporting Root CA RootCA.der
certutil -L -d RootCADB -r -n RootCA -o RootCA.der
chains.sh: #1845: AnyPolicyWithLevel: Exporting Root CA RootCA.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #1846: AnyPolicyWithLevel: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #1847: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 606225593   --extCP --extIA < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n
1
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #1848: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA1RootCA.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der
chains.sh: #1849: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database  - PASSED
chains.sh: Creating DB CA12DB
certutil -N -d CA12DB -f CA12DB/dbpasswd
chains.sh: #1850: AnyPolicyWithLevel: Creating DB CA12DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA12Req.der
certutil -s "CN=CA12 Intermediate, O=CA12, C=US"  -R -2 -d CA12DB -f CA12DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA12Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #1851: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der  - PASSED
chains.sh: Creating certficate CA12CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 606225594   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #1852: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA12CA1.der to CA12DB database
certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der
chains.sh: #1853: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database  - PASSED
chains.sh: Creating DB CA13DB
certutil -N -d CA13DB -f CA13DB/dbpasswd
chains.sh: #1854: AnyPolicyWithLevel: Creating DB CA13DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA13Req.der
certutil -s "CN=CA13 Intermediate, O=CA13, C=US"  -R -2 -d CA13DB -f CA13DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA13Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #1855: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der  - PASSED
chains.sh: Creating certficate CA13CA12.der signed by CA12
certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 606225595   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #1856: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12  - PASSED
chains.sh: Importing certificate CA13CA12.der to CA13DB database
certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der
chains.sh: #1857: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #1858: AnyPolicyWithLevel: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o EE1Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #1859: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA13.der signed by CA13
certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 606225596   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #1860: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13  - PASSED
chains.sh: Importing certificate EE1CA13.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der
chains.sh: #1861: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database  - PASSED
chains.sh: Creating DB CA22DB
certutil -N -d CA22DB -f CA22DB/dbpasswd
chains.sh: #1862: AnyPolicyWithLevel: Creating DB CA22DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA22Req.der
certutil -s "CN=CA22 Intermediate, O=CA22, C=US"  -R -2 -d CA22DB -f CA22DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA22Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #1863: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der  - PASSED
chains.sh: Creating certficate CA22CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 606225597   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #1864: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA22CA1.der to CA22DB database
certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der
chains.sh: #1865: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database  - PASSED
chains.sh: Creating DB CA23DB
certutil -N -d CA23DB -f CA23DB/dbpasswd
chains.sh: #1866: AnyPolicyWithLevel: Creating DB CA23DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA23Req.der
certutil -s "CN=CA23 Intermediate, O=CA23, C=US"  -R -2 -d CA23DB -f CA23DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA23Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #1867: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der  - PASSED
chains.sh: Creating certficate CA23CA22.der signed by CA22
certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 606225598   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #1868: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22  - PASSED
chains.sh: Importing certificate CA23CA22.der to CA23DB database
certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der
chains.sh: #1869: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #1870: AnyPolicyWithLevel: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o EE2Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #1871: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA23.der signed by CA23
certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 606225599   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #1872: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23  - PASSED
chains.sh: Importing certificate EE2CA23.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der
chains.sh: #1873: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database  - PASSED
chains.sh: Creating DB CA32DB
certutil -N -d CA32DB -f CA32DB/dbpasswd
chains.sh: #1874: AnyPolicyWithLevel: Creating DB CA32DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA32Req.der
certutil -s "CN=CA32 Intermediate, O=CA32, C=US"  -R -2 -d CA32DB -f CA32DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA32Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #1875: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der  - PASSED
chains.sh: Creating certficate CA32CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 606225600   --extCP --extIA < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n
1
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #1876: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA32CA1.der to CA32DB database
certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der
chains.sh: #1877: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database  - PASSED
chains.sh: Creating DB CA33DB
certutil -N -d CA33DB -f CA33DB/dbpasswd
chains.sh: #1878: AnyPolicyWithLevel: Creating DB CA33DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA33Req.der
certutil -s "CN=CA33 Intermediate, O=CA33, C=US"  -R -2 -d CA33DB -f CA33DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA33Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #1879: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der  - PASSED
chains.sh: Creating certficate CA33CA32.der signed by CA32
certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 606225601   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #1880: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32  - PASSED
chains.sh: Importing certificate CA33CA32.der to CA33DB database
certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der
chains.sh: #1881: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database  - PASSED
chains.sh: Creating DB EE3DB
certutil -N -d EE3DB -f EE3DB/dbpasswd
chains.sh: #1882: AnyPolicyWithLevel: Creating DB EE3DB  - PASSED
chains.sh: Creating EE certifiate request EE3Req.der
certutil -s "CN=EE3 EE, O=EE3, C=US"  -R  -d EE3DB -f EE3DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o EE3Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #1883: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der  - PASSED
chains.sh: Creating certficate EE3CA33.der signed by CA33
certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 606225602   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #1884: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33  - PASSED
chains.sh: Importing certificate EE3CA33.der to EE3DB database
certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der
chains.sh: #1885: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database  - PASSED
chains.sh: Creating DB CA42DB
certutil -N -d CA42DB -f CA42DB/dbpasswd
chains.sh: #1886: AnyPolicyWithLevel: Creating DB CA42DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA42Req.der
certutil -s "CN=CA42 Intermediate, O=CA42, C=US"  -R -2 -d CA42DB -f CA42DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA42Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #1887: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der  - PASSED
chains.sh: Creating certficate CA42CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 606225603   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
y
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #1888: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA42CA1.der to CA42DB database
certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der
chains.sh: #1889: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database  - PASSED
chains.sh: Creating DB CA43DB
certutil -N -d CA43DB -f CA43DB/dbpasswd
chains.sh: #1890: AnyPolicyWithLevel: Creating DB CA43DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA43Req.der
certutil -s "CN=CA43 Intermediate, O=CA43, C=US"  -R -2 -d CA43DB -f CA43DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA43Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #1891: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der  - PASSED
chains.sh: Creating certficate CA43CA42.der signed by CA42
certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 606225604   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
y
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #1892: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42  - PASSED
chains.sh: Importing certificate CA43CA42.der to CA43DB database
certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der
chains.sh: #1893: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database  - PASSED
chains.sh: Creating DB EE4DB
certutil -N -d EE4DB -f EE4DB/dbpasswd
chains.sh: #1894: AnyPolicyWithLevel: Creating DB EE4DB  - PASSED
chains.sh: Creating EE certifiate request EE4Req.der
certutil -s "CN=EE4 EE, O=EE4, C=US"  -R  -d EE4DB -f EE4DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o EE4Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #1895: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der  - PASSED
chains.sh: Creating certficate EE4CA43.der signed by CA43
certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 606225605   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #1896: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43  - PASSED
chains.sh: Importing certificate EE4CA43.der to EE4DB database
certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der
chains.sh: #1897: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database  - PASSED
chains.sh: Creating DB CA52DB
certutil -N -d CA52DB -f CA52DB/dbpasswd
chains.sh: #1898: AnyPolicyWithLevel: Creating DB CA52DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA52Req.der
certutil -s "CN=CA52 Intermediate, O=CA52, C=US"  -R -2 -d CA52DB -f CA52DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA52Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #1899: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der  - PASSED
chains.sh: Creating certficate CA52CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 606225606   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
y
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #1900: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA52CA1.der to CA52DB database
certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der
chains.sh: #1901: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database  - PASSED
chains.sh: Creating DB CA53DB
certutil -N -d CA53DB -f CA53DB/dbpasswd
chains.sh: #1902: AnyPolicyWithLevel: Creating DB CA53DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA53Req.der
certutil -s "CN=CA53 Intermediate, O=CA53, C=US"  -R -2 -d CA53DB -f CA53DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA53Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #1903: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der  - PASSED
chains.sh: Creating certficate CA53CA52.der signed by CA52
certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 606225607   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #1904: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52  - PASSED
chains.sh: Importing certificate CA53CA52.der to CA53DB database
certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der
chains.sh: #1905: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database  - PASSED
chains.sh: Creating DB EE5DB
certutil -N -d EE5DB -f EE5DB/dbpasswd
chains.sh: #1906: AnyPolicyWithLevel: Creating DB EE5DB  - PASSED
chains.sh: Creating EE certifiate request EE5Req.der
certutil -s "CN=EE5 EE, O=EE5, C=US"  -R  -d EE5DB -f EE5DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o EE5Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #1907: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der  - PASSED
chains.sh: Creating certficate EE5CA53.der signed by CA53
certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 606225608   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #1908: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53  - PASSED
chains.sh: Importing certificate EE5CA53.der to EE5DB database
certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der
chains.sh: #1909: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database  - PASSED
chains.sh: Creating DB CA61DB
certutil -N -d CA61DB -f CA61DB/dbpasswd
chains.sh: #1910: AnyPolicyWithLevel: Creating DB CA61DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA61Req.der
certutil -s "CN=CA61 Intermediate, O=CA61, C=US"  -R -2 -d CA61DB -f CA61DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA61Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #1911: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der  - PASSED
chains.sh: Creating certficate CA61RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 606225609   --extCP --extIA < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n
5
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #1912: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA61RootCA.der to CA61DB database
certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der
chains.sh: #1913: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database  - PASSED
chains.sh: Creating DB CA62DB
certutil -N -d CA62DB -f CA62DB/dbpasswd
chains.sh: #1914: AnyPolicyWithLevel: Creating DB CA62DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA62Req.der
certutil -s "CN=CA62 Intermediate, O=CA62, C=US"  -R -2 -d CA62DB -f CA62DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA62Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #1915: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der  - PASSED
chains.sh: Creating certficate CA62CA61.der signed by CA61
certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 606225610   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #1916: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61  - PASSED
chains.sh: Importing certificate CA62CA61.der to CA62DB database
certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der
chains.sh: #1917: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database  - PASSED
chains.sh: Creating DB EE62DB
certutil -N -d EE62DB -f EE62DB/dbpasswd
chains.sh: #1918: AnyPolicyWithLevel: Creating DB EE62DB  - PASSED
chains.sh: Creating EE certifiate request EE62Req.der
certutil -s "CN=EE62 EE, O=EE62, C=US"  -R  -d EE62DB -f EE62DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o EE62Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #1919: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der  - PASSED
chains.sh: Creating certficate EE62CA62.der signed by CA62
certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 606225611   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #1920: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62  - PASSED
chains.sh: Importing certificate EE62CA62.der to EE62DB database
certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der
chains.sh: #1921: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database  - PASSED
chains.sh: Creating DB CA63DB
certutil -N -d CA63DB -f CA63DB/dbpasswd
chains.sh: #1922: AnyPolicyWithLevel: Creating DB CA63DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA63Req.der
certutil -s "CN=CA63 Intermediate, O=CA63, C=US"  -R -2 -d CA63DB -f CA63DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA63Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #1923: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der  - PASSED
chains.sh: Creating certficate CA63CA62.der signed by CA62
certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 606225612   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #1924: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62  - PASSED
chains.sh: Importing certificate CA63CA62.der to CA63DB database
certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der
chains.sh: #1925: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database  - PASSED
chains.sh: Creating DB EE63DB
certutil -N -d EE63DB -f EE63DB/dbpasswd
chains.sh: #1926: AnyPolicyWithLevel: Creating DB EE63DB  - PASSED
chains.sh: Creating EE certifiate request EE63Req.der
certutil -s "CN=EE63 EE, O=EE63, C=US"  -R  -d EE63DB -f EE63DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o EE63Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #1927: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der  - PASSED
chains.sh: Creating certficate EE63CA63.der signed by CA63
certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 606225613   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #1928: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63  - PASSED
chains.sh: Importing certificate EE63CA63.der to EE63DB database
certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der
chains.sh: #1929: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database  - PASSED
chains.sh: Creating DB CA64DB
certutil -N -d CA64DB -f CA64DB/dbpasswd
chains.sh: #1930: AnyPolicyWithLevel: Creating DB CA64DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA64Req.der
certutil -s "CN=CA64 Intermediate, O=CA64, C=US"  -R -2 -d CA64DB -f CA64DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA64Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #1931: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der  - PASSED
chains.sh: Creating certficate CA64CA63.der signed by CA63
certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 606225614   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #1932: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63  - PASSED
chains.sh: Importing certificate CA64CA63.der to CA64DB database
certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der
chains.sh: #1933: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database  - PASSED
chains.sh: Creating DB EE64DB
certutil -N -d EE64DB -f EE64DB/dbpasswd
chains.sh: #1934: AnyPolicyWithLevel: Creating DB EE64DB  - PASSED
chains.sh: Creating EE certifiate request EE64Req.der
certutil -s "CN=EE64 EE, O=EE64, C=US"  -R  -d EE64DB -f EE64DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o EE64Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #1935: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der  - PASSED
chains.sh: Creating certficate EE64CA64.der signed by CA64
certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 606225615   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #1936: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64  - PASSED
chains.sh: Importing certificate EE64CA64.der to EE64DB database
certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der
chains.sh: #1937: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database  - PASSED
chains.sh: Creating DB CA65DB
certutil -N -d CA65DB -f CA65DB/dbpasswd
chains.sh: #1938: AnyPolicyWithLevel: Creating DB CA65DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA65Req.der
certutil -s "CN=CA65 Intermediate, O=CA65, C=US"  -R -2 -d CA65DB -f CA65DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA65Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #1939: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der  - PASSED
chains.sh: Creating certficate CA65CA64.der signed by CA64
certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 606225616   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #1940: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64  - PASSED
chains.sh: Importing certificate CA65CA64.der to CA65DB database
certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der
chains.sh: #1941: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database  - PASSED
chains.sh: Creating DB EE65DB
certutil -N -d EE65DB -f EE65DB/dbpasswd
chains.sh: #1942: AnyPolicyWithLevel: Creating DB EE65DB  - PASSED
chains.sh: Creating EE certifiate request EE65Req.der
certutil -s "CN=EE65 EE, O=EE65, C=US"  -R  -d EE65DB -f EE65DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o EE65Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #1943: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der  - PASSED
chains.sh: Creating certficate EE65CA65.der signed by CA65
certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 606225617   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #1944: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65  - PASSED
chains.sh: Importing certificate EE65CA65.der to EE65DB database
certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der
chains.sh: #1945: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database  - PASSED
chains.sh: Creating DB CA66DB
certutil -N -d CA66DB -f CA66DB/dbpasswd
chains.sh: #1946: AnyPolicyWithLevel: Creating DB CA66DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA66Req.der
certutil -s "CN=CA66 Intermediate, O=CA66, C=US"  -R -2 -d CA66DB -f CA66DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA66Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #1947: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der  - PASSED
chains.sh: Creating certficate CA66CA65.der signed by CA65
certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 606225618   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #1948: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65  - PASSED
chains.sh: Importing certificate CA66CA65.der to CA66DB database
certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der
chains.sh: #1949: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database  - PASSED
chains.sh: Creating DB EE66DB
certutil -N -d EE66DB -f EE66DB/dbpasswd
chains.sh: #1950: AnyPolicyWithLevel: Creating DB EE66DB  - PASSED
chains.sh: Creating EE certifiate request EE66Req.der
certutil -s "CN=EE66 EE, O=EE66, C=US"  -R  -d EE66DB -f EE66DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o EE66Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #1951: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der  - PASSED
chains.sh: Creating certficate EE66CA66.der signed by CA66
certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 606225619   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #1952: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66  - PASSED
chains.sh: Importing certificate EE66CA66.der to EE66DB database
certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der
chains.sh: #1953: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database  - PASSED
chains.sh: Creating DB CA67DB
certutil -N -d CA67DB -f CA67DB/dbpasswd
chains.sh: #1954: AnyPolicyWithLevel: Creating DB CA67DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA67Req.der
certutil -s "CN=CA67 Intermediate, O=CA67, C=US"  -R -2 -d CA67DB -f CA67DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA67Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #1955: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der  - PASSED
chains.sh: Creating certficate CA67CA66.der signed by CA66
certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 606225620   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #1956: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66  - PASSED
chains.sh: Importing certificate CA67CA66.der to CA67DB database
certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der
chains.sh: #1957: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database  - PASSED
chains.sh: Creating DB EE67DB
certutil -N -d EE67DB -f EE67DB/dbpasswd
chains.sh: #1958: AnyPolicyWithLevel: Creating DB EE67DB  - PASSED
chains.sh: Creating EE certifiate request EE67Req.der
certutil -s "CN=EE67 EE, O=EE67, C=US"  -R  -d EE67DB -f EE67DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o EE67Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #1959: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der  - PASSED
chains.sh: Creating certficate EE67CA67.der signed by CA67
certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 606225621   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #1960: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67  - PASSED
chains.sh: Importing certificate EE67CA67.der to EE67DB database
certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der
chains.sh: #1961: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #1962: AnyPolicyWithLevel: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags   -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225592 (0x242244b8)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Mon Jun 06 22:56:59 2016
            Not After : Sun Jun 06 22:56:59 2066
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:fa:86:0e:62:84:c8:a2:96:12:da:34:b6:ff:91:6d:
                    72:45:d4:87:25:4b:c5:15:d3:b7:53:4d:a2:ac:65:c2:
                    80:ec:26:6b:f5:c1:c1:66:bf:7b:fe:54:96:ac:10:f0:
                    c2:65:53:73:1f:3d:c5:b4:58:8f:ea:b5:d0:8c:d4:67:
                    b2:88:70:c1:9d:33:5b:c4:4c:f0:d5:0d:af:72:5e:b9:
                    e6:4e:bf:99:07:1e:04:e0:8b:e8:1f:8f:ff:77:b7:de:
                    93:76:8b:15:c0:59:c0:b2:95:3d:15:8d:d0:7f:7b:c3:
                    1a:1d:07:da:b1:d9:ae:2f:0b:4d:27:e9:af:fe:33:e5
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        a5:ae:ba:86:ad:67:03:63:28:ec:3d:a2:5d:ec:2c:11:
        5e:e2:61:60:aa:aa:7f:d6:d5:7b:14:01:66:47:a0:ec:
        e9:7d:db:8d:c9:10:84:46:6c:63:c6:20:63:57:fd:57:
        1b:c6:2e:8d:23:1f:3b:71:a6:03:52:e0:f2:af:35:06:
        17:06:b0:ef:a9:2e:ba:9e:2f:28:3c:42:00:57:cd:5d:
        de:aa:ea:27:cf:3a:54:5c:72:7b:ed:fe:3d:1a:38:de:
        30:c1:22:1d:e0:5e:e5:76:f2:55:16:5b:8f:a0:7a:98:
        49:b5:c8:a3:b2:cb:54:41:c8:e2:fe:e5:fc:49:8d:9e
    Fingerprint (MD5):
        9A:3C:24:0A:71:C2:33:7C:5E:F8:C3:C7:FC:DA:89:A5
    Fingerprint (SHA1):
        AD:76:B3:42:F5:23:AE:4F:44:48:BC:84:07:58:F5:90:31:75:1C:10


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US"
Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #1963: AnyPolicyWithLevel: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags   -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags   -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.0  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #1964: AnyPolicyWithLevel: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags   -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags   -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.5.29.32.0  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225592 (0x242244b8)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Mon Jun 06 22:56:59 2016
            Not After : Sun Jun 06 22:56:59 2066
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:fa:86:0e:62:84:c8:a2:96:12:da:34:b6:ff:91:6d:
                    72:45:d4:87:25:4b:c5:15:d3:b7:53:4d:a2:ac:65:c2:
                    80:ec:26:6b:f5:c1:c1:66:bf:7b:fe:54:96:ac:10:f0:
                    c2:65:53:73:1f:3d:c5:b4:58:8f:ea:b5:d0:8c:d4:67:
                    b2:88:70:c1:9d:33:5b:c4:4c:f0:d5:0d:af:72:5e:b9:
                    e6:4e:bf:99:07:1e:04:e0:8b:e8:1f:8f:ff:77:b7:de:
                    93:76:8b:15:c0:59:c0:b2:95:3d:15:8d:d0:7f:7b:c3:
                    1a:1d:07:da:b1:d9:ae:2f:0b:4d:27:e9:af:fe:33:e5
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        a5:ae:ba:86:ad:67:03:63:28:ec:3d:a2:5d:ec:2c:11:
        5e:e2:61:60:aa:aa:7f:d6:d5:7b:14:01:66:47:a0:ec:
        e9:7d:db:8d:c9:10:84:46:6c:63:c6:20:63:57:fd:57:
        1b:c6:2e:8d:23:1f:3b:71:a6:03:52:e0:f2:af:35:06:
        17:06:b0:ef:a9:2e:ba:9e:2f:28:3c:42:00:57:cd:5d:
        de:aa:ea:27:cf:3a:54:5c:72:7b:ed:fe:3d:1a:38:de:
        30:c1:22:1d:e0:5e:e5:76:f2:55:16:5b:8f:a0:7a:98:
        49:b5:c8:a3:b2:cb:54:41:c8:e2:fe:e5:fc:49:8d:9e
    Fingerprint (MD5):
        9A:3C:24:0A:71:C2:33:7C:5E:F8:C3:C7:FC:DA:89:A5
    Fingerprint (SHA1):
        AD:76:B3:42:F5:23:AE:4F:44:48:BC:84:07:58:F5:90:31:75:1C:10


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US"
Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #1965: AnyPolicyWithLevel: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags   -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags   -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #1966: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags   -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags   -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.0  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #1967: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags   -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags   -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.5.29.32.0  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #1968: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags   -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags   -d AllDB     -t RootCA.der
vfychain -d AllDB -pp -vv       EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225592 (0x242244b8)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Mon Jun 06 22:56:59 2016
            Not After : Sun Jun 06 22:56:59 2066
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:fa:86:0e:62:84:c8:a2:96:12:da:34:b6:ff:91:6d:
                    72:45:d4:87:25:4b:c5:15:d3:b7:53:4d:a2:ac:65:c2:
                    80:ec:26:6b:f5:c1:c1:66:bf:7b:fe:54:96:ac:10:f0:
                    c2:65:53:73:1f:3d:c5:b4:58:8f:ea:b5:d0:8c:d4:67:
                    b2:88:70:c1:9d:33:5b:c4:4c:f0:d5:0d:af:72:5e:b9:
                    e6:4e:bf:99:07:1e:04:e0:8b:e8:1f:8f:ff:77:b7:de:
                    93:76:8b:15:c0:59:c0:b2:95:3d:15:8d:d0:7f:7b:c3:
                    1a:1d:07:da:b1:d9:ae:2f:0b:4d:27:e9:af:fe:33:e5
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        a5:ae:ba:86:ad:67:03:63:28:ec:3d:a2:5d:ec:2c:11:
        5e:e2:61:60:aa:aa:7f:d6:d5:7b:14:01:66:47:a0:ec:
        e9:7d:db:8d:c9:10:84:46:6c:63:c6:20:63:57:fd:57:
        1b:c6:2e:8d:23:1f:3b:71:a6:03:52:e0:f2:af:35:06:
        17:06:b0:ef:a9:2e:ba:9e:2f:28:3c:42:00:57:cd:5d:
        de:aa:ea:27:cf:3a:54:5c:72:7b:ed:fe:3d:1a:38:de:
        30:c1:22:1d:e0:5e:e5:76:f2:55:16:5b:8f:a0:7a:98:
        49:b5:c8:a3:b2:cb:54:41:c8:e2:fe:e5:fc:49:8d:9e
    Fingerprint (MD5):
        9A:3C:24:0A:71:C2:33:7C:5E:F8:C3:C7:FC:DA:89:A5
    Fingerprint (SHA1):
        AD:76:B3:42:F5:23:AE:4F:44:48:BC:84:07:58:F5:90:31:75:1C:10


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US"
Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #1969: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags   -d AllDB     -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags   -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #1970: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags   -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags   -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.0  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #1971: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags   -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags   -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.5.29.32.0  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #1972: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags   -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags   -d AllDB     -t RootCA.der
vfychain -d AllDB -pp -vv       EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225592 (0x242244b8)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Mon Jun 06 22:56:59 2016
            Not After : Sun Jun 06 22:56:59 2066
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:fa:86:0e:62:84:c8:a2:96:12:da:34:b6:ff:91:6d:
                    72:45:d4:87:25:4b:c5:15:d3:b7:53:4d:a2:ac:65:c2:
                    80:ec:26:6b:f5:c1:c1:66:bf:7b:fe:54:96:ac:10:f0:
                    c2:65:53:73:1f:3d:c5:b4:58:8f:ea:b5:d0:8c:d4:67:
                    b2:88:70:c1:9d:33:5b:c4:4c:f0:d5:0d:af:72:5e:b9:
                    e6:4e:bf:99:07:1e:04:e0:8b:e8:1f:8f:ff:77:b7:de:
                    93:76:8b:15:c0:59:c0:b2:95:3d:15:8d:d0:7f:7b:c3:
                    1a:1d:07:da:b1:d9:ae:2f:0b:4d:27:e9:af:fe:33:e5
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        a5:ae:ba:86:ad:67:03:63:28:ec:3d:a2:5d:ec:2c:11:
        5e:e2:61:60:aa:aa:7f:d6:d5:7b:14:01:66:47:a0:ec:
        e9:7d:db:8d:c9:10:84:46:6c:63:c6:20:63:57:fd:57:
        1b:c6:2e:8d:23:1f:3b:71:a6:03:52:e0:f2:af:35:06:
        17:06:b0:ef:a9:2e:ba:9e:2f:28:3c:42:00:57:cd:5d:
        de:aa:ea:27:cf:3a:54:5c:72:7b:ed:fe:3d:1a:38:de:
        30:c1:22:1d:e0:5e:e5:76:f2:55:16:5b:8f:a0:7a:98:
        49:b5:c8:a3:b2:cb:54:41:c8:e2:fe:e5:fc:49:8d:9e
    Fingerprint (MD5):
        9A:3C:24:0A:71:C2:33:7C:5E:F8:C3:C7:FC:DA:89:A5
    Fingerprint (SHA1):
        AD:76:B3:42:F5:23:AE:4F:44:48:BC:84:07:58:F5:90:31:75:1C:10


Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US"
Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US"
Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #1973: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags   -d AllDB     -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags   -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225592 (0x242244b8)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Mon Jun 06 22:56:59 2016
            Not After : Sun Jun 06 22:56:59 2066
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:fa:86:0e:62:84:c8:a2:96:12:da:34:b6:ff:91:6d:
                    72:45:d4:87:25:4b:c5:15:d3:b7:53:4d:a2:ac:65:c2:
                    80:ec:26:6b:f5:c1:c1:66:bf:7b:fe:54:96:ac:10:f0:
                    c2:65:53:73:1f:3d:c5:b4:58:8f:ea:b5:d0:8c:d4:67:
                    b2:88:70:c1:9d:33:5b:c4:4c:f0:d5:0d:af:72:5e:b9:
                    e6:4e:bf:99:07:1e:04:e0:8b:e8:1f:8f:ff:77:b7:de:
                    93:76:8b:15:c0:59:c0:b2:95:3d:15:8d:d0:7f:7b:c3:
                    1a:1d:07:da:b1:d9:ae:2f:0b:4d:27:e9:af:fe:33:e5
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        a5:ae:ba:86:ad:67:03:63:28:ec:3d:a2:5d:ec:2c:11:
        5e:e2:61:60:aa:aa:7f:d6:d5:7b:14:01:66:47:a0:ec:
        e9:7d:db:8d:c9:10:84:46:6c:63:c6:20:63:57:fd:57:
        1b:c6:2e:8d:23:1f:3b:71:a6:03:52:e0:f2:af:35:06:
        17:06:b0:ef:a9:2e:ba:9e:2f:28:3c:42:00:57:cd:5d:
        de:aa:ea:27:cf:3a:54:5c:72:7b:ed:fe:3d:1a:38:de:
        30:c1:22:1d:e0:5e:e5:76:f2:55:16:5b:8f:a0:7a:98:
        49:b5:c8:a3:b2:cb:54:41:c8:e2:fe:e5:fc:49:8d:9e
    Fingerprint (MD5):
        9A:3C:24:0A:71:C2:33:7C:5E:F8:C3:C7:FC:DA:89:A5
    Fingerprint (SHA1):
        AD:76:B3:42:F5:23:AE:4F:44:48:BC:84:07:58:F5:90:31:75:1C:10


Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US"
Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US"
Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #1974: AnyPolicyWithLevel: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags   -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags   -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.0  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #1975: AnyPolicyWithLevel: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags   -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags   -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.5.29.32.0  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225592 (0x242244b8)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Mon Jun 06 22:56:59 2016
            Not After : Sun Jun 06 22:56:59 2066
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:fa:86:0e:62:84:c8:a2:96:12:da:34:b6:ff:91:6d:
                    72:45:d4:87:25:4b:c5:15:d3:b7:53:4d:a2:ac:65:c2:
                    80:ec:26:6b:f5:c1:c1:66:bf:7b:fe:54:96:ac:10:f0:
                    c2:65:53:73:1f:3d:c5:b4:58:8f:ea:b5:d0:8c:d4:67:
                    b2:88:70:c1:9d:33:5b:c4:4c:f0:d5:0d:af:72:5e:b9:
                    e6:4e:bf:99:07:1e:04:e0:8b:e8:1f:8f:ff:77:b7:de:
                    93:76:8b:15:c0:59:c0:b2:95:3d:15:8d:d0:7f:7b:c3:
                    1a:1d:07:da:b1:d9:ae:2f:0b:4d:27:e9:af:fe:33:e5
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        a5:ae:ba:86:ad:67:03:63:28:ec:3d:a2:5d:ec:2c:11:
        5e:e2:61:60:aa:aa:7f:d6:d5:7b:14:01:66:47:a0:ec:
        e9:7d:db:8d:c9:10:84:46:6c:63:c6:20:63:57:fd:57:
        1b:c6:2e:8d:23:1f:3b:71:a6:03:52:e0:f2:af:35:06:
        17:06:b0:ef:a9:2e:ba:9e:2f:28:3c:42:00:57:cd:5d:
        de:aa:ea:27:cf:3a:54:5c:72:7b:ed:fe:3d:1a:38:de:
        30:c1:22:1d:e0:5e:e5:76:f2:55:16:5b:8f:a0:7a:98:
        49:b5:c8:a3:b2:cb:54:41:c8:e2:fe:e5:fc:49:8d:9e
    Fingerprint (MD5):
        9A:3C:24:0A:71:C2:33:7C:5E:F8:C3:C7:FC:DA:89:A5
    Fingerprint (SHA1):
        AD:76:B3:42:F5:23:AE:4F:44:48:BC:84:07:58:F5:90:31:75:1C:10


Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US"
Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US"
Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #1976: AnyPolicyWithLevel: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags   -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags   -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #1977: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags   -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags   -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.0  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #1978: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags   -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags   -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.5.29.32.0  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #1979: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags   -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags   -d AllDB     -t RootCA.der
vfychain -d AllDB -pp -vv       EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225592 (0x242244b8)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Mon Jun 06 22:56:59 2016
            Not After : Sun Jun 06 22:56:59 2066
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:fa:86:0e:62:84:c8:a2:96:12:da:34:b6:ff:91:6d:
                    72:45:d4:87:25:4b:c5:15:d3:b7:53:4d:a2:ac:65:c2:
                    80:ec:26:6b:f5:c1:c1:66:bf:7b:fe:54:96:ac:10:f0:
                    c2:65:53:73:1f:3d:c5:b4:58:8f:ea:b5:d0:8c:d4:67:
                    b2:88:70:c1:9d:33:5b:c4:4c:f0:d5:0d:af:72:5e:b9:
                    e6:4e:bf:99:07:1e:04:e0:8b:e8:1f:8f:ff:77:b7:de:
                    93:76:8b:15:c0:59:c0:b2:95:3d:15:8d:d0:7f:7b:c3:
                    1a:1d:07:da:b1:d9:ae:2f:0b:4d:27:e9:af:fe:33:e5
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        a5:ae:ba:86:ad:67:03:63:28:ec:3d:a2:5d:ec:2c:11:
        5e:e2:61:60:aa:aa:7f:d6:d5:7b:14:01:66:47:a0:ec:
        e9:7d:db:8d:c9:10:84:46:6c:63:c6:20:63:57:fd:57:
        1b:c6:2e:8d:23:1f:3b:71:a6:03:52:e0:f2:af:35:06:
        17:06:b0:ef:a9:2e:ba:9e:2f:28:3c:42:00:57:cd:5d:
        de:aa:ea:27:cf:3a:54:5c:72:7b:ed:fe:3d:1a:38:de:
        30:c1:22:1d:e0:5e:e5:76:f2:55:16:5b:8f:a0:7a:98:
        49:b5:c8:a3:b2:cb:54:41:c8:e2:fe:e5:fc:49:8d:9e
    Fingerprint (MD5):
        9A:3C:24:0A:71:C2:33:7C:5E:F8:C3:C7:FC:DA:89:A5
    Fingerprint (SHA1):
        AD:76:B3:42:F5:23:AE:4F:44:48:BC:84:07:58:F5:90:31:75:1C:10


Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US"
Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US"
Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #1980: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags   -d AllDB     -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags   -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225592 (0x242244b8)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Mon Jun 06 22:56:59 2016
            Not After : Sun Jun 06 22:56:59 2066
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:fa:86:0e:62:84:c8:a2:96:12:da:34:b6:ff:91:6d:
                    72:45:d4:87:25:4b:c5:15:d3:b7:53:4d:a2:ac:65:c2:
                    80:ec:26:6b:f5:c1:c1:66:bf:7b:fe:54:96:ac:10:f0:
                    c2:65:53:73:1f:3d:c5:b4:58:8f:ea:b5:d0:8c:d4:67:
                    b2:88:70:c1:9d:33:5b:c4:4c:f0:d5:0d:af:72:5e:b9:
                    e6:4e:bf:99:07:1e:04:e0:8b:e8:1f:8f:ff:77:b7:de:
                    93:76:8b:15:c0:59:c0:b2:95:3d:15:8d:d0:7f:7b:c3:
                    1a:1d:07:da:b1:d9:ae:2f:0b:4d:27:e9:af:fe:33:e5
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        a5:ae:ba:86:ad:67:03:63:28:ec:3d:a2:5d:ec:2c:11:
        5e:e2:61:60:aa:aa:7f:d6:d5:7b:14:01:66:47:a0:ec:
        e9:7d:db:8d:c9:10:84:46:6c:63:c6:20:63:57:fd:57:
        1b:c6:2e:8d:23:1f:3b:71:a6:03:52:e0:f2:af:35:06:
        17:06:b0:ef:a9:2e:ba:9e:2f:28:3c:42:00:57:cd:5d:
        de:aa:ea:27:cf:3a:54:5c:72:7b:ed:fe:3d:1a:38:de:
        30:c1:22:1d:e0:5e:e5:76:f2:55:16:5b:8f:a0:7a:98:
        49:b5:c8:a3:b2:cb:54:41:c8:e2:fe:e5:fc:49:8d:9e
    Fingerprint (MD5):
        9A:3C:24:0A:71:C2:33:7C:5E:F8:C3:C7:FC:DA:89:A5
    Fingerprint (SHA1):
        AD:76:B3:42:F5:23:AE:4F:44:48:BC:84:07:58:F5:90:31:75:1C:10


Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US"
Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #1981: AnyPolicyWithLevel: Verifying certificate(s)  EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags   -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags   -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225592 (0x242244b8)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Mon Jun 06 22:56:59 2016
            Not After : Sun Jun 06 22:56:59 2066
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:fa:86:0e:62:84:c8:a2:96:12:da:34:b6:ff:91:6d:
                    72:45:d4:87:25:4b:c5:15:d3:b7:53:4d:a2:ac:65:c2:
                    80:ec:26:6b:f5:c1:c1:66:bf:7b:fe:54:96:ac:10:f0:
                    c2:65:53:73:1f:3d:c5:b4:58:8f:ea:b5:d0:8c:d4:67:
                    b2:88:70:c1:9d:33:5b:c4:4c:f0:d5:0d:af:72:5e:b9:
                    e6:4e:bf:99:07:1e:04:e0:8b:e8:1f:8f:ff:77:b7:de:
                    93:76:8b:15:c0:59:c0:b2:95:3d:15:8d:d0:7f:7b:c3:
                    1a:1d:07:da:b1:d9:ae:2f:0b:4d:27:e9:af:fe:33:e5
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        a5:ae:ba:86:ad:67:03:63:28:ec:3d:a2:5d:ec:2c:11:
        5e:e2:61:60:aa:aa:7f:d6:d5:7b:14:01:66:47:a0:ec:
        e9:7d:db:8d:c9:10:84:46:6c:63:c6:20:63:57:fd:57:
        1b:c6:2e:8d:23:1f:3b:71:a6:03:52:e0:f2:af:35:06:
        17:06:b0:ef:a9:2e:ba:9e:2f:28:3c:42:00:57:cd:5d:
        de:aa:ea:27:cf:3a:54:5c:72:7b:ed:fe:3d:1a:38:de:
        30:c1:22:1d:e0:5e:e5:76:f2:55:16:5b:8f:a0:7a:98:
        49:b5:c8:a3:b2:cb:54:41:c8:e2:fe:e5:fc:49:8d:9e
    Fingerprint (MD5):
        9A:3C:24:0A:71:C2:33:7C:5E:F8:C3:C7:FC:DA:89:A5
    Fingerprint (SHA1):
        AD:76:B3:42:F5:23:AE:4F:44:48:BC:84:07:58:F5:90:31:75:1C:10


Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US"
Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #1982: AnyPolicyWithLevel: Verifying certificate(s)  EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags   -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags   -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225592 (0x242244b8)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Mon Jun 06 22:56:59 2016
            Not After : Sun Jun 06 22:56:59 2066
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:fa:86:0e:62:84:c8:a2:96:12:da:34:b6:ff:91:6d:
                    72:45:d4:87:25:4b:c5:15:d3:b7:53:4d:a2:ac:65:c2:
                    80:ec:26:6b:f5:c1:c1:66:bf:7b:fe:54:96:ac:10:f0:
                    c2:65:53:73:1f:3d:c5:b4:58:8f:ea:b5:d0:8c:d4:67:
                    b2:88:70:c1:9d:33:5b:c4:4c:f0:d5:0d:af:72:5e:b9:
                    e6:4e:bf:99:07:1e:04:e0:8b:e8:1f:8f:ff:77:b7:de:
                    93:76:8b:15:c0:59:c0:b2:95:3d:15:8d:d0:7f:7b:c3:
                    1a:1d:07:da:b1:d9:ae:2f:0b:4d:27:e9:af:fe:33:e5
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        a5:ae:ba:86:ad:67:03:63:28:ec:3d:a2:5d:ec:2c:11:
        5e:e2:61:60:aa:aa:7f:d6:d5:7b:14:01:66:47:a0:ec:
        e9:7d:db:8d:c9:10:84:46:6c:63:c6:20:63:57:fd:57:
        1b:c6:2e:8d:23:1f:3b:71:a6:03:52:e0:f2:af:35:06:
        17:06:b0:ef:a9:2e:ba:9e:2f:28:3c:42:00:57:cd:5d:
        de:aa:ea:27:cf:3a:54:5c:72:7b:ed:fe:3d:1a:38:de:
        30:c1:22:1d:e0:5e:e5:76:f2:55:16:5b:8f:a0:7a:98:
        49:b5:c8:a3:b2:cb:54:41:c8:e2:fe:e5:fc:49:8d:9e
    Fingerprint (MD5):
        9A:3C:24:0A:71:C2:33:7C:5E:F8:C3:C7:FC:DA:89:A5
    Fingerprint (SHA1):
        AD:76:B3:42:F5:23:AE:4F:44:48:BC:84:07:58:F5:90:31:75:1C:10


Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US"
Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US"
Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #1983: AnyPolicyWithLevel: Verifying certificate(s)  EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags   -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags   -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225592 (0x242244b8)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Mon Jun 06 22:56:59 2016
            Not After : Sun Jun 06 22:56:59 2066
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:fa:86:0e:62:84:c8:a2:96:12:da:34:b6:ff:91:6d:
                    72:45:d4:87:25:4b:c5:15:d3:b7:53:4d:a2:ac:65:c2:
                    80:ec:26:6b:f5:c1:c1:66:bf:7b:fe:54:96:ac:10:f0:
                    c2:65:53:73:1f:3d:c5:b4:58:8f:ea:b5:d0:8c:d4:67:
                    b2:88:70:c1:9d:33:5b:c4:4c:f0:d5:0d:af:72:5e:b9:
                    e6:4e:bf:99:07:1e:04:e0:8b:e8:1f:8f:ff:77:b7:de:
                    93:76:8b:15:c0:59:c0:b2:95:3d:15:8d:d0:7f:7b:c3:
                    1a:1d:07:da:b1:d9:ae:2f:0b:4d:27:e9:af:fe:33:e5
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        a5:ae:ba:86:ad:67:03:63:28:ec:3d:a2:5d:ec:2c:11:
        5e:e2:61:60:aa:aa:7f:d6:d5:7b:14:01:66:47:a0:ec:
        e9:7d:db:8d:c9:10:84:46:6c:63:c6:20:63:57:fd:57:
        1b:c6:2e:8d:23:1f:3b:71:a6:03:52:e0:f2:af:35:06:
        17:06:b0:ef:a9:2e:ba:9e:2f:28:3c:42:00:57:cd:5d:
        de:aa:ea:27:cf:3a:54:5c:72:7b:ed:fe:3d:1a:38:de:
        30:c1:22:1d:e0:5e:e5:76:f2:55:16:5b:8f:a0:7a:98:
        49:b5:c8:a3:b2:cb:54:41:c8:e2:fe:e5:fc:49:8d:9e
    Fingerprint (MD5):
        9A:3C:24:0A:71:C2:33:7C:5E:F8:C3:C7:FC:DA:89:A5
    Fingerprint (SHA1):
        AD:76:B3:42:F5:23:AE:4F:44:48:BC:84:07:58:F5:90:31:75:1C:10


Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US"
Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US"
Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US"
Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #1984: AnyPolicyWithLevel: Verifying certificate(s)  EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags   -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags   -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225592 (0x242244b8)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Mon Jun 06 22:56:59 2016
            Not After : Sun Jun 06 22:56:59 2066
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:fa:86:0e:62:84:c8:a2:96:12:da:34:b6:ff:91:6d:
                    72:45:d4:87:25:4b:c5:15:d3:b7:53:4d:a2:ac:65:c2:
                    80:ec:26:6b:f5:c1:c1:66:bf:7b:fe:54:96:ac:10:f0:
                    c2:65:53:73:1f:3d:c5:b4:58:8f:ea:b5:d0:8c:d4:67:
                    b2:88:70:c1:9d:33:5b:c4:4c:f0:d5:0d:af:72:5e:b9:
                    e6:4e:bf:99:07:1e:04:e0:8b:e8:1f:8f:ff:77:b7:de:
                    93:76:8b:15:c0:59:c0:b2:95:3d:15:8d:d0:7f:7b:c3:
                    1a:1d:07:da:b1:d9:ae:2f:0b:4d:27:e9:af:fe:33:e5
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        a5:ae:ba:86:ad:67:03:63:28:ec:3d:a2:5d:ec:2c:11:
        5e:e2:61:60:aa:aa:7f:d6:d5:7b:14:01:66:47:a0:ec:
        e9:7d:db:8d:c9:10:84:46:6c:63:c6:20:63:57:fd:57:
        1b:c6:2e:8d:23:1f:3b:71:a6:03:52:e0:f2:af:35:06:
        17:06:b0:ef:a9:2e:ba:9e:2f:28:3c:42:00:57:cd:5d:
        de:aa:ea:27:cf:3a:54:5c:72:7b:ed:fe:3d:1a:38:de:
        30:c1:22:1d:e0:5e:e5:76:f2:55:16:5b:8f:a0:7a:98:
        49:b5:c8:a3:b2:cb:54:41:c8:e2:fe:e5:fc:49:8d:9e
    Fingerprint (MD5):
        9A:3C:24:0A:71:C2:33:7C:5E:F8:C3:C7:FC:DA:89:A5
    Fingerprint (SHA1):
        AD:76:B3:42:F5:23:AE:4F:44:48:BC:84:07:58:F5:90:31:75:1C:10


Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US"
Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US"
Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US"
Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US"
Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #1985: AnyPolicyWithLevel: Verifying certificate(s)  EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags   -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags   -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #1986: AnyPolicyWithLevel: Verifying certificate(s)  EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags   -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #1987: explicitPolicy: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -m 606225622 < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #1988: explicitPolicy: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #1989: explicitPolicy: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB nonEVCADB
certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd
chains.sh: #1990: explicitPolicy: Creating DB nonEVCADB  - PASSED
chains.sh: Creating Intermediate certifiate request nonEVCAReq.der
certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US"  -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o nonEVCAReq.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #1991: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der  - PASSED
chains.sh: Creating certficate nonEVCARoot.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 606225623   < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #1992: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root  - PASSED
chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database
certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der
chains.sh: #1993: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database  - PASSED
chains.sh: Creating DB EVCADB
certutil -N -d EVCADB -f EVCADB/dbpasswd
chains.sh: #1994: explicitPolicy: Creating DB EVCADB  - PASSED
chains.sh: Creating Intermediate certifiate request EVCAReq.der
certutil -s "CN=EVCA Intermediate, O=EVCA, C=US"  -R -2 -d EVCADB -f EVCADB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o EVCAReq.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #1995: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der  - PASSED
chains.sh: Creating certficate EVCARoot.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 606225624   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #1996: explicitPolicy: Creating certficate EVCARoot.der signed by Root  - PASSED
chains.sh: Importing certificate EVCARoot.der to EVCADB database
certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der
chains.sh: #1997: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database  - PASSED
chains.sh: Creating DB otherEVCADB
certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd
chains.sh: #1998: explicitPolicy: Creating DB otherEVCADB  - PASSED
chains.sh: Creating Intermediate certifiate request otherEVCAReq.der
certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US"  -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o otherEVCAReq.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #1999: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der  - PASSED
chains.sh: Creating certficate otherEVCARoot.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 606225625   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #2000: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root  - PASSED
chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database
certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der
chains.sh: #2001: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database  - PASSED
chains.sh: Creating DB validEVDB
certutil -N -d validEVDB -f validEVDB/dbpasswd
chains.sh: #2002: explicitPolicy: Creating DB validEVDB  - PASSED
chains.sh: Creating EE certifiate request validEVReq.der
certutil -s "CN=validEV EE, O=validEV, C=US"  -R  -d validEVDB -f validEVDB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o validEVReq.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #2003: explicitPolicy: Creating EE certifiate request validEVReq.der  - PASSED
chains.sh: Creating certficate validEVEVCA.der signed by EVCA
certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 606225626   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #2004: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA  - PASSED
chains.sh: Importing certificate validEVEVCA.der to validEVDB database
certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der
chains.sh: #2005: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database  - PASSED
chains.sh: Creating DB invalidEVDB
certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd
chains.sh: #2006: explicitPolicy: Creating DB invalidEVDB  - PASSED
chains.sh: Creating EE certifiate request invalidEVReq.der
certutil -s "CN=invalidEV EE, O=invalidEV, C=US"  -R  -d invalidEVDB -f invalidEVDB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o invalidEVReq.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #2007: explicitPolicy: Creating EE certifiate request invalidEVReq.der  - PASSED
chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA
certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 606225627   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #2008: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA  - PASSED
chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database
certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der
chains.sh: #2009: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database  - PASSED
chains.sh: Creating DB wrongEVOIDDB
certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd
chains.sh: #2010: explicitPolicy: Creating DB wrongEVOIDDB  - PASSED
chains.sh: Creating EE certifiate request wrongEVOIDReq.der
certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US"  -R  -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o wrongEVOIDReq.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #2011: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der  - PASSED
chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA
certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 606225628   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #2012: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA  - PASSED
chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database
certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der
chains.sh: #2013: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #2014: explicitPolicy: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  validEVEVCA.der EVCARoot.der Root.der with flags   -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv      -o OID.1.0  validEVEVCA.der EVCARoot.der Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225622 (0x242244d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Mon Jun 06 22:57:54 2016
            Not After : Sun Jun 06 22:57:54 2066
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    be:76:e2:b7:48:61:8f:f9:03:35:19:ef:2a:18:1e:f0:
                    83:fa:95:7e:e8:ae:e2:97:22:97:87:b4:ab:b6:a2:8a:
                    30:b4:08:42:47:34:9e:03:9e:2f:d9:98:eb:1d:dd:c1:
                    f3:0c:38:4e:be:6f:be:da:7a:c4:db:ac:cc:18:54:97:
                    8b:48:9d:9d:3e:48:cc:ab:45:18:97:90:7f:79:e0:6b:
                    d0:d2:ed:12:18:09:f7:83:d5:7f:b4:47:8b:1a:9b:2c:
                    e5:0c:ec:4b:1b:b3:60:e3:c3:ad:cb:6c:b7:34:e1:f9:
                    b8:b5:93:69:a3:8a:cc:8e:0c:27:50:31:a2:f7:9f:9d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        53:8e:d9:17:ba:e2:62:32:e4:94:15:e7:bd:30:de:46:
        b2:dc:84:01:26:96:e9:3e:48:99:4a:7c:dc:1c:46:fa:
        c3:dd:45:e3:88:eb:81:e4:11:51:6d:ad:09:e7:84:33:
        4f:22:84:da:8b:45:8d:39:a9:47:a1:fd:44:b6:08:a6:
        b7:46:c6:01:e0:e5:03:e3:40:8a:bc:17:b2:29:dd:fb:
        e4:ed:a5:ed:53:98:ca:25:fd:d7:8d:cf:2b:ab:66:a2:
        66:93:95:4f:bd:8d:fb:70:b6:c7:fa:67:06:e5:79:be:
        ff:70:d5:bd:e1:7b:a1:45:1b:8f:a1:a0:6e:83:04:4c
    Fingerprint (MD5):
        65:66:05:9B:0E:90:71:AE:FE:1F:F7:F8:25:81:7A:B1
    Fingerprint (SHA1):
        2B:11:DB:74:41:A2:6D:84:A1:B4:ED:A2:9A:27:DC:D0:CB:96:8F:9A


Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US"
Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US"
Returned value is 0, expected result is pass
chains.sh: #2015: explicitPolicy: Verifying certificate(s)  validEVEVCA.der EVCARoot.der Root.der with flags   -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags   -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv      -o OID.1.0  invalidEVnonEVCA.der nonEVCARoot.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #2016: explicitPolicy: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags   -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags   -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv      -o OID.1.0  wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #2017: explicitPolicy: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags   -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #2018: explicitPolicy: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  validEVEVCA.der EVCARoot.der with flags   -d AllDB    -o OID.1.0 
vfychain -d AllDB -pp -vv      -o OID.1.0  validEVEVCA.der EVCARoot.der 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225622 (0x242244d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Mon Jun 06 22:57:54 2016
            Not After : Sun Jun 06 22:57:54 2066
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    be:76:e2:b7:48:61:8f:f9:03:35:19:ef:2a:18:1e:f0:
                    83:fa:95:7e:e8:ae:e2:97:22:97:87:b4:ab:b6:a2:8a:
                    30:b4:08:42:47:34:9e:03:9e:2f:d9:98:eb:1d:dd:c1:
                    f3:0c:38:4e:be:6f:be:da:7a:c4:db:ac:cc:18:54:97:
                    8b:48:9d:9d:3e:48:cc:ab:45:18:97:90:7f:79:e0:6b:
                    d0:d2:ed:12:18:09:f7:83:d5:7f:b4:47:8b:1a:9b:2c:
                    e5:0c:ec:4b:1b:b3:60:e3:c3:ad:cb:6c:b7:34:e1:f9:
                    b8:b5:93:69:a3:8a:cc:8e:0c:27:50:31:a2:f7:9f:9d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        53:8e:d9:17:ba:e2:62:32:e4:94:15:e7:bd:30:de:46:
        b2:dc:84:01:26:96:e9:3e:48:99:4a:7c:dc:1c:46:fa:
        c3:dd:45:e3:88:eb:81:e4:11:51:6d:ad:09:e7:84:33:
        4f:22:84:da:8b:45:8d:39:a9:47:a1:fd:44:b6:08:a6:
        b7:46:c6:01:e0:e5:03:e3:40:8a:bc:17:b2:29:dd:fb:
        e4:ed:a5:ed:53:98:ca:25:fd:d7:8d:cf:2b:ab:66:a2:
        66:93:95:4f:bd:8d:fb:70:b6:c7:fa:67:06:e5:79:be:
        ff:70:d5:bd:e1:7b:a1:45:1b:8f:a1:a0:6e:83:04:4c
    Fingerprint (MD5):
        65:66:05:9B:0E:90:71:AE:FE:1F:F7:F8:25:81:7A:B1
    Fingerprint (SHA1):
        2B:11:DB:74:41:A2:6D:84:A1:B4:ED:A2:9A:27:DC:D0:CB:96:8F:9A

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US"
Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US"
Returned value is 0, expected result is pass
chains.sh: #2019: explicitPolicy: Verifying certificate(s)  validEVEVCA.der EVCARoot.der with flags   -d AllDB    -o OID.1.0  - PASSED
chains.sh: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der with flags   -d AllDB    -o OID.1.0 
vfychain -d AllDB -pp -vv      -o OID.1.0  invalidEVnonEVCA.der nonEVCARoot.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #2020: explicitPolicy: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der with flags   -d AllDB    -o OID.1.0  - PASSED
chains.sh: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der with flags   -d AllDB    -o OID.1.0 
vfychain -d AllDB -pp -vv      -o OID.1.0  wrongEVOIDotherEVCA.der otherEVCARoot.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #2021: explicitPolicy: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der with flags   -d AllDB    -o OID.1.0  - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #2022: Mapping: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -m 606225629 < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #2023: Mapping: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #2024: Mapping: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #2025: Mapping: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #2026: Mapping: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 606225630   --extCP --extPM < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n
OID.1.0
OID.1.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #2027: Mapping: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #2028: Mapping: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #2029: Mapping: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #2030: Mapping: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 606225631   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #2031: Mapping: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #2032: Mapping: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #2033: Mapping: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o UserReq.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #2034: Mapping: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 606225632   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #2035: Mapping: Creating certficate UserCA2.der signed by CA2  - PASSED
chains.sh: Importing certificate UserCA2.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der
chains.sh: #2036: Mapping: Importing certificate UserCA2.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #2037: Mapping: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #2038: Mapping: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #2039: Mapping: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #2040: Mapping: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags   -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225629 (0x242244dd)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Mon Jun 06 22:58:06 2016
            Not After : Sun Jun 06 22:58:06 2066
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    dc:2a:55:91:fa:ee:94:95:94:3e:4f:41:ea:54:81:f0:
                    9f:04:da:f9:8f:d9:a7:eb:83:49:84:60:f1:be:4b:e5:
                    ce:ae:a7:b6:eb:c3:44:bf:ae:c9:2a:f0:a9:3f:41:74:
                    fd:4a:e3:8a:74:f5:7d:ee:4d:a1:af:5c:9c:a3:da:2a:
                    b8:aa:c7:4b:d4:81:f4:aa:d6:b3:12:52:ea:60:87:8b:
                    02:68:b0:85:05:57:07:40:de:84:17:a7:de:38:7e:2b:
                    be:e9:1d:55:07:cd:0e:46:ba:70:29:5f:b5:47:69:1f:
                    4c:86:f9:6e:a6:f0:b6:d9:98:9d:f5:41:85:d4:3f:a7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        71:1e:ce:e8:5b:a3:3a:84:55:9b:ac:6a:9a:45:04:7d:
        a3:0f:93:c6:af:20:ae:e9:3a:da:f5:5e:4e:53:dd:64:
        8f:99:1c:1d:72:00:1c:4c:1d:d5:d3:2c:9c:82:ce:b2:
        ec:08:4b:b5:0d:27:7c:91:d0:1b:7b:ef:d1:5a:36:d3:
        4a:16:05:fe:4a:ba:1d:f5:e2:80:46:a1:28:9c:a4:8d:
        f4:3d:5b:46:4d:2e:16:e2:6e:8a:21:21:b7:23:1f:2b:
        ab:45:de:9f:90:f4:4d:ae:4c:72:84:5b:41:de:ff:6a:
        5c:a5:35:4e:aa:25:cf:e0:f5:58:fb:49:62:89:73:73
    Fingerprint (MD5):
        19:17:87:99:DE:68:14:EB:99:95:FA:27:D5:94:2C:B4
    Fingerprint (SHA1):
        B6:CF:E0:CC:28:BD:3B:70:5E:38:73:A5:07:A7:E6:BE:CD:64:E0:2C

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #2041: Mapping: Verifying certificate(s)  UserCA2.der with flags   -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags   -d AllDB    -o OID.1.1  -t Root
vfychain -d AllDB -pp -vv      -o OID.1.1  UserCA2.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #2042: Mapping: Verifying certificate(s)  UserCA2.der with flags   -d AllDB    -o OID.1.1  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags   -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA2.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #2043: Mapping: Verifying certificate(s)  UserCA2.der with flags   -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags   -d AllDB    -o OID.1.1  -t CA1
vfychain -d AllDB -pp -vv      -o OID.1.1  UserCA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225630 (0x242244de)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Mon Jun 06 22:58:08 2016
            Not After : Sun Jun 06 22:58:08 2021
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    f8:f8:cc:04:d4:a4:ed:bb:9f:72:67:bb:e8:42:82:0a:
                    f7:ba:55:cc:60:e0:89:99:94:a6:cf:32:db:e6:de:2c:
                    8a:3e:54:e4:ab:83:24:10:9d:d3:83:b0:44:07:87:9f:
                    e5:cf:50:c1:8f:06:9e:24:f3:de:81:a0:ba:89:8a:0d:
                    b1:90:62:9f:a1:60:c2:87:a6:fd:7b:37:20:3d:b1:26:
                    24:d3:ed:bd:d6:a6:0a:c4:77:6b:1b:63:e2:14:b8:4c:
                    d1:40:b4:1f:aa:38:02:28:59:ab:d1:28:a5:2b:fa:ff:
                    2a:70:87:e0:61:30:95:d9:1b:18:a7:03:9c:10:75:f7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policy Mappings
            Data: Sequence {
                Sequence {
                    OID.1.0
                    User Defined Policy OID
                }
            }

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        5b:05:23:de:16:0e:37:9f:33:13:14:57:ef:b4:53:08:
        b0:13:ac:99:00:90:ca:dd:45:3f:d6:61:28:55:69:b1:
        36:ac:28:f5:5e:52:89:28:ca:c8:08:e7:0b:d0:fb:57:
        d1:5b:98:80:db:9c:87:d6:d4:3c:b9:72:07:ce:39:29:
        4a:3f:72:9e:15:c7:8d:e3:1f:7d:71:79:ed:41:57:62:
        85:7a:82:74:29:d4:32:61:24:12:00:57:cd:73:ad:e0:
        2e:12:cf:d7:4f:4a:e1:ba:00:ea:1e:30:6a:f9:ee:9c:
        ec:f3:e6:08:d9:7b:c1:bc:31:c4:e9:18:c4:0f:49:77
    Fingerprint (MD5):
        4E:35:39:EC:34:18:D4:20:D9:FF:C8:51:C3:F6:3E:63
    Fingerprint (SHA1):
        72:2D:54:CA:40:E3:63:D9:C2:D7:32:C9:50:4B:CD:24:05:DC:44:4F

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #2044: Mapping: Verifying certificate(s)  UserCA2.der with flags   -d AllDB    -o OID.1.1  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags   -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA2.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #2045: Mapping: Verifying certificate(s)  UserCA2.der with flags   -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags   -d AllDB    -o OID.1.1  -t CA2
vfychain -d AllDB -pp -vv      -o OID.1.1  UserCA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225631 (0x242244df)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Mon Jun 06 22:58:08 2016
            Not After : Sun Jun 06 22:58:08 2021
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:95:06:d9:7d:47:a9:da:e2:d3:8f:53:cc:7f:7d:f4:
                    46:c6:e7:56:97:25:d2:12:4b:cb:d6:48:ff:25:62:64:
                    ab:22:2b:08:97:c8:93:4b:1b:0a:ce:c8:87:73:7f:fb:
                    9c:be:8d:55:63:57:d0:13:25:24:0c:f7:25:5a:9c:e4:
                    7a:53:31:48:89:c1:cf:22:36:6b:59:ce:5c:b8:80:2a:
                    05:71:ab:37:08:7e:e9:a6:69:73:bb:cb:8b:da:ba:6b:
                    95:0f:a1:10:74:4d:88:87:fe:fb:be:ea:fe:37:84:0c:
                    c1:d1:e8:86:81:6e:2e:73:62:2d:0a:e6:97:7a:1e:8d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        d7:c5:69:f7:24:f3:20:5d:4d:26:97:7b:b9:2d:f1:1e:
        c7:23:79:80:54:fd:cf:a9:bf:35:c0:1c:e0:97:4b:fd:
        df:c6:bc:a8:f7:9c:30:c4:d5:3f:7a:82:25:70:98:2f:
        55:46:2f:b0:bb:8b:dd:4e:13:ad:c9:99:3e:4e:0c:00:
        15:5a:67:58:7e:a3:a6:e1:06:79:b9:ab:b9:eb:c3:42:
        9e:36:fe:0c:91:eb:fd:89:94:66:fa:64:81:97:cf:b8:
        01:08:58:dd:e5:9f:5b:73:8a:88:cd:a5:d3:bf:fa:e2:
        73:31:e3:97:85:c6:17:c0:1d:37:27:81:69:4d:45:0d
    Fingerprint (MD5):
        84:32:7F:3D:2F:6A:92:62:BD:F7:7F:58:D8:9A:3E:3C
    Fingerprint (SHA1):
        EF:51:A0:E0:14:73:38:AF:17:34:22:A3:9B:55:21:3E:58:49:F4:44

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Returned value is 0, expected result is pass
chains.sh: #2046: Mapping: Verifying certificate(s)  UserCA2.der with flags   -d AllDB    -o OID.1.1  -t CA2 - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #2047: Mapping2: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -m 606225633 < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #2048: Mapping2: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #2049: Mapping2: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #2050: Mapping2: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #2051: Mapping2: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 606225634   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #2052: Mapping2: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #2053: Mapping2: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #2054: Mapping2: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #2055: Mapping2: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 606225635   --extCP --extPM < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n
OID.1.0
OID.1.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #2056: Mapping2: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #2057: Mapping2: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB CA3DB
certutil -N -d CA3DB -f CA3DB/dbpasswd
chains.sh: #2058: Mapping2: Creating DB CA3DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA3Req.der
certutil -s "CN=CA3 Intermediate, O=CA3, C=US"  -R -2 -d CA3DB -f CA3DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA3Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #2059: Mapping2: Creating Intermediate certifiate request CA3Req.der  - PASSED
chains.sh: Creating certficate CA3CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 606225636   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #2060: Mapping2: Creating certficate CA3CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate CA3CA2.der to CA3DB database
certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der
chains.sh: #2061: Mapping2: Importing certificate CA3CA2.der to CA3DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #2062: Mapping2: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o UserReq.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #2063: Mapping2: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA3.der signed by CA3
certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 606225637   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #2064: Mapping2: Creating certficate UserCA3.der signed by CA3  - PASSED
chains.sh: Importing certificate UserCA3.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der
chains.sh: #2065: Mapping2: Importing certificate UserCA3.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #2066: Mapping2: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #2067: Mapping2: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #2068: Mapping2: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #2069: Mapping2: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Importing certificate CA3CA2.der to AllDB database
certutil -A -n CA3  -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der
chains.sh: #2070: Mapping2: Importing certificate CA3CA2.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags   -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA3.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225633 (0x242244e1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Mon Jun 06 22:58:14 2016
            Not After : Sun Jun 06 22:58:14 2066
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ab:bb:97:eb:9c:be:ee:1d:b9:0b:24:92:b8:5e:a7:36:
                    36:f8:20:f0:f5:aa:fe:b7:b5:04:28:3a:a2:9c:44:0e:
                    c8:47:40:41:9a:e6:5b:82:42:ca:d0:d4:f1:df:d5:0e:
                    d0:26:11:74:c5:88:ce:05:cb:1b:78:bb:37:9e:25:2d:
                    4d:e3:64:a2:92:21:85:3b:52:19:c2:57:0e:ec:49:e4:
                    75:04:c3:f0:05:3c:44:1d:35:f6:6b:bf:34:32:39:99:
                    65:0a:95:1f:ee:15:55:9c:04:55:0b:6b:05:0d:49:a3:
                    fb:06:9f:5c:4f:0f:f9:ef:aa:9b:2e:ff:e2:b5:f6:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        69:04:2a:78:fe:ce:fd:0a:6d:a5:91:ef:13:23:77:28:
        ab:26:6e:d1:28:33:cf:33:ca:1b:5e:be:8b:75:e1:c0:
        bf:2e:a8:ca:3e:cb:85:f4:2e:40:da:50:f6:38:5f:f0:
        9a:b5:91:3b:b8:3d:23:fd:d2:e8:f5:a5:83:47:c0:0b:
        68:0a:5b:1e:3a:75:64:ff:99:6f:9e:63:d8:67:bc:72:
        2b:fa:92:97:1e:23:9e:ba:3d:6a:19:c4:f4:cd:c0:14:
        13:0f:ba:7f:21:9d:bf:c3:a9:62:ad:f7:d4:65:8e:f1:
        25:04:ec:db:fb:b7:f1:ad:c0:3b:48:8d:5e:e5:cc:8f
    Fingerprint (MD5):
        C8:3F:D2:2E:3F:5F:64:8F:F4:A8:F2:96:5F:0F:14:99
    Fingerprint (SHA1):
        F3:1D:7E:C6:1A:1C:A1:23:CC:6D:7A:32:A8:91:9B:DA:6A:8B:9C:8D

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #2071: Mapping2: Verifying certificate(s)  UserCA3.der with flags   -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags   -d AllDB    -o OID.1.1  -t Root
vfychain -d AllDB -pp -vv      -o OID.1.1  UserCA3.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #2072: Mapping2: Verifying certificate(s)  UserCA3.der with flags   -d AllDB    -o OID.1.1  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags   -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA3.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225634 (0x242244e2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Mon Jun 06 22:58:15 2016
            Not After : Sun Jun 06 22:58:15 2021
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bf:50:26:b1:b5:49:8d:07:b4:a1:fd:d0:54:e5:09:92:
                    63:47:d8:6e:4d:de:3c:11:4a:14:58:70:7d:7a:d0:e1:
                    14:eb:91:63:0a:13:5f:42:be:e7:7f:1f:53:10:b5:86:
                    e8:8c:e7:f1:1b:51:94:b6:da:59:90:05:60:6e:1a:39:
                    1b:08:ed:6d:4f:81:bf:f0:90:fb:ce:d3:7b:6b:33:76:
                    52:62:25:ea:12:81:93:7c:60:fd:94:2a:05:02:5f:09:
                    76:56:e5:d2:29:61:1d:99:4b:ac:06:85:7e:cf:25:e0:
                    a0:54:55:13:88:43:13:72:8e:56:9e:f9:c9:5b:86:c3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        74:fd:4f:6b:ba:8a:c1:7d:be:8c:2a:06:3e:0d:3c:fb:
        8b:2d:b3:50:b4:0b:11:10:1e:ad:8d:5a:e4:8f:1f:57:
        00:dc:e8:d0:9d:fc:14:64:72:b5:74:8e:29:4c:44:28:
        eb:01:8c:18:d6:b3:d5:df:e5:86:86:3f:53:df:26:75:
        84:7c:e2:f7:73:63:af:fc:42:6d:3a:e0:b8:b7:ec:e0:
        07:40:ba:8a:17:01:6d:c9:95:2e:b2:81:33:b0:4e:66:
        3a:11:7c:ce:b4:e4:c0:5a:f2:81:82:7e:a9:63:1f:b0:
        6d:7f:fe:d2:54:c7:64:5f:1c:b9:43:5a:09:2e:7d:f3
    Fingerprint (MD5):
        B3:DD:EE:43:DE:C1:A5:81:6B:59:5A:D9:65:25:7C:60
    Fingerprint (SHA1):
        EB:FF:5A:10:47:8A:4E:7D:43:50:25:92:DC:36:40:CD:A1:54:69:AD

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #2073: Mapping2: Verifying certificate(s)  UserCA3.der with flags   -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags   -d AllDB    -o OID.1.1  -t CA1
vfychain -d AllDB -pp -vv      -o OID.1.1  UserCA3.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #2074: Mapping2: Verifying certificate(s)  UserCA3.der with flags   -d AllDB    -o OID.1.1  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags   -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA3.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #2075: Mapping2: Verifying certificate(s)  UserCA3.der with flags   -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags   -d AllDB    -o OID.1.1  -t CA2
vfychain -d AllDB -pp -vv      -o OID.1.1  UserCA3.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225635 (0x242244e3)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Mon Jun 06 22:58:16 2016
            Not After : Sun Jun 06 22:58:16 2021
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b2:65:70:e5:b2:40:37:dd:a8:82:65:01:7f:16:61:16:
                    72:40:81:b9:b8:22:ce:10:d6:66:02:1b:d5:35:0c:a3:
                    37:e0:7c:fc:95:9d:b9:42:9d:b0:15:5c:36:34:c6:41:
                    b7:af:83:3a:2a:69:9e:98:dc:3f:93:31:77:c8:5b:5e:
                    5f:9b:f7:90:86:d5:b0:3e:03:45:f7:e1:c9:58:d2:87:
                    34:13:d9:df:67:88:43:ad:31:4b:ee:73:94:b4:73:5f:
                    dd:4f:77:46:34:aa:be:ab:40:9b:d4:be:f3:b3:1d:71:
                    b6:32:af:c3:b3:2c:62:da:df:c6:ee:a7:b9:10:71:bf
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policy Mappings
            Data: Sequence {
                Sequence {
                    OID.1.0
                    User Defined Policy OID
                }
            }

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        a9:f1:a0:5e:f1:42:79:e2:93:8a:ca:0e:8f:c9:08:65:
        0b:ac:d0:6e:70:66:6b:aa:af:77:7f:f1:04:3c:d3:cc:
        fa:62:5f:20:6b:87:cc:00:51:18:f5:6f:92:18:14:8d:
        4b:c1:41:d7:7f:f2:a6:a1:b5:42:bf:56:07:c1:6f:d9:
        d0:07:64:37:47:39:27:2f:8b:80:4c:08:7f:f0:56:ce:
        35:50:1d:2d:22:57:a6:10:4f:7c:f2:a4:59:04:24:6b:
        aa:58:4f:6c:6d:32:de:d0:91:ce:1b:d9:fc:90:ba:65:
        c8:b7:ff:72:72:e4:af:fc:d9:8b:1c:1b:65:62:09:7f
    Fingerprint (MD5):
        7B:2F:92:72:E7:F0:A0:43:D4:DE:28:45:4D:76:C5:BB
    Fingerprint (SHA1):
        D8:91:A7:AC:6A:5C:2F:56:41:D9:9D:CE:62:1C:90:9D:39:15:D8:65

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Returned value is 0, expected result is pass
chains.sh: #2076: Mapping2: Verifying certificate(s)  UserCA3.der with flags   -d AllDB    -o OID.1.1  -t CA2 - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #2077: AIA: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -m 606225638 < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #2078: AIA: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #2079: AIA: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #2080: AIA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #2081: AIA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 606225639   < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #2082: AIA: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #2083: AIA: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #2084: AIA: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #2085: AIA: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 606225640   --extAIA < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/testbuildd-1853-CA1Root-606225548.der
0
n
n
===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #2086: AIA: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #2087: AIA: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #2088: AIA: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o UserReq.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #2089: AIA: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 606225641   < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #2090: AIA: Creating certficate UserCA2.der signed by CA2  - PASSED
chains.sh: Importing certificate UserCA2.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der
chains.sh: #2091: AIA: Importing certificate UserCA2.der to UserDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags   -d UserDB     -t Root.der
vfychain -d UserDB -pp -vv       UserCA2.der CA2CA1.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=CA1 Intermediate,O=CA1,C=US
Returned value is 1, expected result is fail
chains.sh: #2092: AIA: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags   -d UserDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags   -d UserDB -f    -t Root.der
vfychain -d UserDB -pp -vv   -f    UserCA2.der CA2CA1.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225638 (0x242244e6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Mon Jun 06 22:58:24 2016
            Not After : Sun Jun 06 22:58:24 2066
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bf:bc:03:dc:74:ca:07:c9:c7:e6:f2:0e:b1:48:5e:0e:
                    c1:10:82:21:28:a4:61:d9:31:fb:cc:7f:72:16:6b:74:
                    2b:a9:4b:41:9a:06:9d:d5:dc:cf:d8:e5:53:99:63:52:
                    62:be:ee:c7:79:95:30:c2:8c:ee:c4:f5:25:87:4a:cf:
                    bf:13:e9:8d:74:eb:7c:f8:58:b6:df:4b:5f:19:6c:4e:
                    95:9b:26:c8:c1:d4:2c:a3:35:f0:eb:09:96:86:0f:49:
                    35:4e:ca:93:15:65:b0:ac:09:95:a4:36:f1:4b:86:3f:
                    bd:bc:9f:51:c2:01:38:e6:70:13:8f:22:27:a6:75:5d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        4a:32:86:5f:23:18:34:d6:4a:82:c6:3f:69:a9:c5:a8:
        52:6c:f2:81:df:55:9b:66:f4:7d:04:ea:b5:e6:b7:4b:
        c9:bc:66:95:7f:2b:32:e2:cd:08:e7:bf:e4:ac:23:69:
        af:16:4e:13:c9:b0:f3:5e:86:ff:46:d4:22:0a:cc:50:
        3e:16:75:a9:d6:04:52:3e:19:74:4e:d0:bb:24:bf:41:
        14:5a:d8:bf:e0:47:93:9d:32:a5:9f:59:47:81:13:24:
        5d:9e:31:0e:fd:17:92:48:0a:4e:52:7f:ce:b6:74:70:
        f4:e0:ed:ef:e8:41:31:92:55:3f:ab:3a:08:92:80:e3
    Fingerprint (MD5):
        BE:78:9C:37:11:03:73:DF:2E:DB:86:D2:EA:1D:FF:55
    Fingerprint (SHA1):
        75:E4:84:1E:A0:BE:77:D5:10:7D:AE:FD:2C:0D:55:8E:BD:D8:0C:DD


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #2093: AIA: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags   -d UserDB -f    -t Root.der - PASSED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #2094: BridgeWithAIA: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -m 606225642 < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #2095: BridgeWithAIA: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #2096: BridgeWithAIA: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #2097: BridgeWithAIA: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -m 606225643 < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #2098: BridgeWithAIA: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #2099: BridgeWithAIA: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #2100: BridgeWithAIA: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o BridgeReq.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #2101: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 606225644 -7 Bridge@Army  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #2102: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army  - PASSED
chains.sh: Importing certificate BridgeArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der
chains.sh: #2103: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 606225645 -7 Bridge@Navy  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #2104: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate BridgeNavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der
chains.sh: #2105: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7
chains.sh: #2106: BridgeWithAIA: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #2107: BridgeWithAIA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #2108: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 606225646   --extAIA < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/testbuildd-1853-Bridge-606225549.p7
0
n
n
===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #2109: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA1Bridge.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der
chains.sh: #2110: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #2111: BridgeWithAIA: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o EE1Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #2112: BridgeWithAIA: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 606225647   < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #2113: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #2114: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags   -d EE1DB     -t Army.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #2115: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags   -d EE1DB     -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags   -d EE1DB -f    -t Army.der
vfychain -d EE1DB -pp -vv   -f    EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. bridge@navy [Certificate Authority]:
Email Address(es): bridge@navy
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #2116: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags   -d EE1DB -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags   -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv   -f    EE1CA1.der CA1Bridge.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225643 (0x242244eb)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Mon Jun 06 22:58:30 2016
            Not After : Sun Jun 06 22:58:30 2066
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:9a:8a:b5:6a:ed:fb:fb:2a:56:b4:94:4a:e6:4f:9a:
                    fc:b7:73:c7:2a:1a:6c:0f:ea:fa:a2:27:1c:5d:a1:76:
                    2b:6b:03:34:f1:ab:42:71:d1:0e:70:e9:00:a8:6e:a2:
                    e2:ce:fa:c2:9f:80:d7:70:f9:e7:16:c1:f1:a0:25:8d:
                    1d:d0:a0:ca:74:e1:72:be:9a:a2:98:7e:6c:ba:39:51:
                    79:8d:a7:c2:9e:85:76:de:da:17:0f:a3:13:4c:1d:77:
                    3d:49:2b:14:84:b1:fa:0c:be:e3:aa:06:2a:87:b3:a0:
                    57:11:52:5f:e9:7f:7e:23:6d:0a:01:62:8e:11:d8:91
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3b:81:98:57:58:a6:b1:e1:ea:38:fc:24:b7:76:35:d6:
        32:d6:81:d6:71:95:9f:0d:40:6e:12:ed:90:5f:d4:39:
        aa:65:6a:e0:b6:ba:94:35:35:6a:e8:21:7f:81:6d:e6:
        16:cf:19:80:d6:da:ea:dd:96:11:91:b0:9b:96:0e:e9:
        a4:93:b3:23:cd:89:34:49:f9:90:8f:f2:8e:c6:3c:97:
        57:27:ab:af:75:fc:77:1a:6f:36:7a:97:34:0b:53:a6:
        45:2a:0b:3d:82:08:13:9b:31:0e:96:cd:e8:86:c9:ba:
        37:c6:0d:ef:b2:80:0a:d0:00:c7:ba:b0:46:b5:ec:76
    Fingerprint (MD5):
        29:14:0F:A8:4C:CD:CE:36:2C:BF:13:36:64:28:92:F1
    Fingerprint (SHA1):
        F3:F3:DF:05:4A:46:59:7B:06:64:FF:3A:CC:90:41:D5:A4:50:32:9F


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #2117: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags   -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags   -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv   -f    EE1CA1.der CA1Bridge.der BridgeArmy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225643 (0x242244eb)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Mon Jun 06 22:58:30 2016
            Not After : Sun Jun 06 22:58:30 2066
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:9a:8a:b5:6a:ed:fb:fb:2a:56:b4:94:4a:e6:4f:9a:
                    fc:b7:73:c7:2a:1a:6c:0f:ea:fa:a2:27:1c:5d:a1:76:
                    2b:6b:03:34:f1:ab:42:71:d1:0e:70:e9:00:a8:6e:a2:
                    e2:ce:fa:c2:9f:80:d7:70:f9:e7:16:c1:f1:a0:25:8d:
                    1d:d0:a0:ca:74:e1:72:be:9a:a2:98:7e:6c:ba:39:51:
                    79:8d:a7:c2:9e:85:76:de:da:17:0f:a3:13:4c:1d:77:
                    3d:49:2b:14:84:b1:fa:0c:be:e3:aa:06:2a:87:b3:a0:
                    57:11:52:5f:e9:7f:7e:23:6d:0a:01:62:8e:11:d8:91
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3b:81:98:57:58:a6:b1:e1:ea:38:fc:24:b7:76:35:d6:
        32:d6:81:d6:71:95:9f:0d:40:6e:12:ed:90:5f:d4:39:
        aa:65:6a:e0:b6:ba:94:35:35:6a:e8:21:7f:81:6d:e6:
        16:cf:19:80:d6:da:ea:dd:96:11:91:b0:9b:96:0e:e9:
        a4:93:b3:23:cd:89:34:49:f9:90:8f:f2:8e:c6:3c:97:
        57:27:ab:af:75:fc:77:1a:6f:36:7a:97:34:0b:53:a6:
        45:2a:0b:3d:82:08:13:9b:31:0e:96:cd:e8:86:c9:ba:
        37:c6:0d:ef:b2:80:0a:d0:00:c7:ba:b0:46:b5:ec:76
    Fingerprint (MD5):
        29:14:0F:A8:4C:CD:CE:36:2C:BF:13:36:64:28:92:F1
    Fingerprint (SHA1):
        F3:F3:DF:05:4A:46:59:7B:06:64:FF:3A:CC:90:41:D5:A4:50:32:9F


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #2118: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags   -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #2119: BridgeWithHalfAIA: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -m 606225648 < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #2120: BridgeWithHalfAIA: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #2121: BridgeWithHalfAIA: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #2122: BridgeWithHalfAIA: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -m 606225649 < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #2123: BridgeWithHalfAIA: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #2124: BridgeWithHalfAIA: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #2125: BridgeWithHalfAIA: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o BridgeReq.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #2126: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 606225650 -7 Bridge@Army  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #2127: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army  - PASSED
chains.sh: Importing certificate BridgeArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der
chains.sh: #2128: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 606225651 -7 Bridge@Navy  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #2129: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate BridgeNavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der
chains.sh: #2130: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7
chains.sh: #2131: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #2132: BridgeWithHalfAIA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #2133: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 606225652   --extAIA < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/testbuildd-1853-Bridge-606225550.p7
0
n
n
===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #2134: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA1Bridge.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der
chains.sh: #2135: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #2136: BridgeWithHalfAIA: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o EE1Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #2137: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 606225653   < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #2138: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #2139: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #2140: BridgeWithHalfAIA: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #2141: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 606225654   --extAIA < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/testbuildd-1853-BridgeNavy-606225551.der
0
n
n
===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #2142: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA2Bridge.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der
chains.sh: #2143: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #2144: BridgeWithHalfAIA: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o EE2Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #2145: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 606225655   < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #2146: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE2CA2.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der
chains.sh: #2147: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags   -d EE1DB     -t Army.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #2148: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags   -d EE1DB     -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags   -d EE1DB -f    -t Army.der
vfychain -d EE1DB -pp -vv   -f    EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. bridge@navy [Certificate Authority]:
Email Address(es): bridge@navy
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #2149: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags   -d EE1DB -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags   -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv   -f    EE1CA1.der CA1Bridge.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225649 (0x242244f1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Mon Jun 06 22:58:39 2016
            Not After : Sun Jun 06 22:58:39 2066
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c1:46:63:4e:f7:ac:9d:b0:a4:6d:21:9e:25:3f:a0:13:
                    4c:82:0a:8e:4b:ec:53:b0:07:61:8a:83:3e:23:95:06:
                    be:58:d0:4f:79:6a:e3:25:84:d8:60:2f:4e:c7:71:b4:
                    99:75:59:fa:d0:df:84:c8:7c:cf:97:91:d2:3d:a4:48:
                    7c:61:7e:a0:21:c0:5f:1a:95:76:ed:00:bb:4a:84:67:
                    95:a0:f8:56:84:d1:5b:99:ee:79:70:13:07:43:ab:d0:
                    ee:0d:6b:5f:73:4b:45:c3:3c:a7:37:5b:13:39:e1:fb:
                    40:50:51:06:23:8d:02:29:6e:2f:be:ea:74:b5:ab:61
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        85:24:b4:ee:bd:e5:ef:c2:8b:64:f9:7d:65:d7:55:28:
        02:c7:90:f1:52:3a:c1:22:ee:5d:03:fd:63:bb:c7:c0:
        a6:83:54:1c:33:fe:36:f4:83:76:70:4c:f0:85:52:c5:
        e1:52:d7:4b:1b:8c:74:43:ce:4d:b8:7e:0f:98:85:f2:
        80:e5:66:7e:53:07:1a:4e:cb:05:90:18:96:a1:06:34:
        dc:f8:1c:d2:66:43:b9:7c:c3:04:77:89:99:37:e7:1c:
        2f:c6:1c:90:5b:ac:32:54:2c:d9:5d:9f:f2:9a:61:14:
        8a:65:5b:c7:c4:22:b7:fa:7a:0a:cc:da:af:23:3e:26
    Fingerprint (MD5):
        3F:3E:07:51:14:54:75:4D:1B:48:1B:C9:34:D8:C9:09
    Fingerprint (SHA1):
        21:48:C9:51:9F:DB:07:C3:B5:B1:32:A3:F5:EE:C9:F5:61:20:A2:E1


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #2150: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags   -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags   -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv   -f    EE1CA1.der CA1Bridge.der BridgeArmy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225649 (0x242244f1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Mon Jun 06 22:58:39 2016
            Not After : Sun Jun 06 22:58:39 2066
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c1:46:63:4e:f7:ac:9d:b0:a4:6d:21:9e:25:3f:a0:13:
                    4c:82:0a:8e:4b:ec:53:b0:07:61:8a:83:3e:23:95:06:
                    be:58:d0:4f:79:6a:e3:25:84:d8:60:2f:4e:c7:71:b4:
                    99:75:59:fa:d0:df:84:c8:7c:cf:97:91:d2:3d:a4:48:
                    7c:61:7e:a0:21:c0:5f:1a:95:76:ed:00:bb:4a:84:67:
                    95:a0:f8:56:84:d1:5b:99:ee:79:70:13:07:43:ab:d0:
                    ee:0d:6b:5f:73:4b:45:c3:3c:a7:37:5b:13:39:e1:fb:
                    40:50:51:06:23:8d:02:29:6e:2f:be:ea:74:b5:ab:61
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        85:24:b4:ee:bd:e5:ef:c2:8b:64:f9:7d:65:d7:55:28:
        02:c7:90:f1:52:3a:c1:22:ee:5d:03:fd:63:bb:c7:c0:
        a6:83:54:1c:33:fe:36:f4:83:76:70:4c:f0:85:52:c5:
        e1:52:d7:4b:1b:8c:74:43:ce:4d:b8:7e:0f:98:85:f2:
        80:e5:66:7e:53:07:1a:4e:cb:05:90:18:96:a1:06:34:
        dc:f8:1c:d2:66:43:b9:7c:c3:04:77:89:99:37:e7:1c:
        2f:c6:1c:90:5b:ac:32:54:2c:d9:5d:9f:f2:9a:61:14:
        8a:65:5b:c7:c4:22:b7:fa:7a:0a:cc:da:af:23:3e:26
    Fingerprint (MD5):
        3F:3E:07:51:14:54:75:4D:1B:48:1B:C9:34:D8:C9:09
    Fingerprint (SHA1):
        21:48:C9:51:9F:DB:07:C3:B5:B1:32:A3:F5:EE:C9:F5:61:20:A2:E1


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #2151: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags   -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der BridgeArmy.der with flags   -d EE1DB -f    -t Army.der
vfychain -d EE1DB -pp -vv   -f    EE2CA2.der BridgeArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=EE2 EE,O=EE2,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=CA2 Intermediate,O=CA2,C=US
Returned value is 1, expected result is fail
chains.sh: #2152: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der BridgeArmy.der with flags   -d EE1DB -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags   -d EE1DB -f    -t Army.der
vfychain -d EE1DB -pp -vv   -f    EE2CA2.der CA2Bridge.der BridgeArmy.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225648 (0x242244f0)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Mon Jun 06 22:58:38 2016
            Not After : Sun Jun 06 22:58:38 2066
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e2:12:2a:81:ed:6d:25:58:f3:b7:0b:59:16:3b:33:d9:
                    65:6e:f5:5a:a0:ee:ee:7d:fd:4f:84:39:54:46:be:07:
                    20:1e:0a:cf:78:f9:79:41:1b:44:7f:39:a4:ce:df:df:
                    81:f9:b7:3b:42:11:6e:9e:32:d7:8a:b5:46:46:8c:ea:
                    ec:35:49:8f:71:ea:6a:bb:09:db:29:59:08:25:e0:78:
                    5a:e1:a5:9f:08:31:c3:19:44:dd:b8:e6:50:d6:ba:25:
                    cb:1f:ec:ba:e4:1d:90:18:d1:66:3b:29:6d:19:37:6c:
                    ca:96:37:e1:80:71:8d:b3:2b:18:77:8a:2a:f0:db:a1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        73:d1:15:90:7d:17:8a:54:d4:97:03:79:e6:b1:dc:a0:
        ed:a9:19:82:ce:9e:27:f6:20:da:5e:65:b9:00:db:d8:
        67:37:2d:28:00:bb:fd:fe:c9:b8:4a:48:11:37:8a:e4:
        28:9f:e2:f7:2b:17:16:6c:18:5b:89:90:57:99:21:82:
        65:24:c7:4e:6b:11:e0:b2:d8:08:5b:cd:c3:24:42:91:
        b8:4b:d9:d8:4e:ba:1c:56:1e:c2:ae:fd:c3:df:04:2b:
        d6:2e:ee:83:02:af:36:ae:e8:02:f4:c3:2f:a2:b4:22:
        7f:13:cc:a5:06:b2:d3:46:cd:1a:8c:65:fd:8b:4e:0f
    Fingerprint (MD5):
        EE:B2:2B:52:90:76:0E:FF:18:83:EF:32:2C:22:D1:B1
    Fingerprint (SHA1):
        EC:B3:72:1B:9F:AB:45:3B:A3:65:44:AD:6C:BB:65:A4:B2:78:A5:35


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #2153: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags   -d EE1DB -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der with flags   -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv   -f    EE2CA2.der CA2Bridge.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225649 (0x242244f1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Mon Jun 06 22:58:39 2016
            Not After : Sun Jun 06 22:58:39 2066
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c1:46:63:4e:f7:ac:9d:b0:a4:6d:21:9e:25:3f:a0:13:
                    4c:82:0a:8e:4b:ec:53:b0:07:61:8a:83:3e:23:95:06:
                    be:58:d0:4f:79:6a:e3:25:84:d8:60:2f:4e:c7:71:b4:
                    99:75:59:fa:d0:df:84:c8:7c:cf:97:91:d2:3d:a4:48:
                    7c:61:7e:a0:21:c0:5f:1a:95:76:ed:00:bb:4a:84:67:
                    95:a0:f8:56:84:d1:5b:99:ee:79:70:13:07:43:ab:d0:
                    ee:0d:6b:5f:73:4b:45:c3:3c:a7:37:5b:13:39:e1:fb:
                    40:50:51:06:23:8d:02:29:6e:2f:be:ea:74:b5:ab:61
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        85:24:b4:ee:bd:e5:ef:c2:8b:64:f9:7d:65:d7:55:28:
        02:c7:90:f1:52:3a:c1:22:ee:5d:03:fd:63:bb:c7:c0:
        a6:83:54:1c:33:fe:36:f4:83:76:70:4c:f0:85:52:c5:
        e1:52:d7:4b:1b:8c:74:43:ce:4d:b8:7e:0f:98:85:f2:
        80:e5:66:7e:53:07:1a:4e:cb:05:90:18:96:a1:06:34:
        dc:f8:1c:d2:66:43:b9:7c:c3:04:77:89:99:37:e7:1c:
        2f:c6:1c:90:5b:ac:32:54:2c:d9:5d:9f:f2:9a:61:14:
        8a:65:5b:c7:c4:22:b7:fa:7a:0a:cc:da:af:23:3e:26
    Fingerprint (MD5):
        3F:3E:07:51:14:54:75:4D:1B:48:1B:C9:34:D8:C9:09
    Fingerprint (SHA1):
        21:48:C9:51:9F:DB:07:C3:B5:B1:32:A3:F5:EE:C9:F5:61:20:A2:E1


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #2154: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der CA2Bridge.der with flags   -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags   -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv   -f    EE2CA2.der CA2Bridge.der BridgeArmy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225649 (0x242244f1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Mon Jun 06 22:58:39 2016
            Not After : Sun Jun 06 22:58:39 2066
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c1:46:63:4e:f7:ac:9d:b0:a4:6d:21:9e:25:3f:a0:13:
                    4c:82:0a:8e:4b:ec:53:b0:07:61:8a:83:3e:23:95:06:
                    be:58:d0:4f:79:6a:e3:25:84:d8:60:2f:4e:c7:71:b4:
                    99:75:59:fa:d0:df:84:c8:7c:cf:97:91:d2:3d:a4:48:
                    7c:61:7e:a0:21:c0:5f:1a:95:76:ed:00:bb:4a:84:67:
                    95:a0:f8:56:84:d1:5b:99:ee:79:70:13:07:43:ab:d0:
                    ee:0d:6b:5f:73:4b:45:c3:3c:a7:37:5b:13:39:e1:fb:
                    40:50:51:06:23:8d:02:29:6e:2f:be:ea:74:b5:ab:61
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        85:24:b4:ee:bd:e5:ef:c2:8b:64:f9:7d:65:d7:55:28:
        02:c7:90:f1:52:3a:c1:22:ee:5d:03:fd:63:bb:c7:c0:
        a6:83:54:1c:33:fe:36:f4:83:76:70:4c:f0:85:52:c5:
        e1:52:d7:4b:1b:8c:74:43:ce:4d:b8:7e:0f:98:85:f2:
        80:e5:66:7e:53:07:1a:4e:cb:05:90:18:96:a1:06:34:
        dc:f8:1c:d2:66:43:b9:7c:c3:04:77:89:99:37:e7:1c:
        2f:c6:1c:90:5b:ac:32:54:2c:d9:5d:9f:f2:9a:61:14:
        8a:65:5b:c7:c4:22:b7:fa:7a:0a:cc:da:af:23:3e:26
    Fingerprint (MD5):
        3F:3E:07:51:14:54:75:4D:1B:48:1B:C9:34:D8:C9:09
    Fingerprint (SHA1):
        21:48:C9:51:9F:DB:07:C3:B5:B1:32:A3:F5:EE:C9:F5:61:20:A2:E1


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #2155: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags   -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #2156: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -m 606225656 < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #2157: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #2158: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #2159: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -m 606225657 < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #2160: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #2161: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB CAArmyDB
certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd
chains.sh: #2162: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB  - PASSED
chains.sh: Creating Intermediate certifiate request CAArmyReq.der
certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US"  -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CAArmyReq.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #2163: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der  - PASSED
chains.sh: Creating certficate CAArmyArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 606225658   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #2164: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army  - PASSED
chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database
certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der
chains.sh: #2165: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database  - PASSED
chains.sh: Creating DB CANavyDB
certutil -N -d CANavyDB -f CANavyDB/dbpasswd
chains.sh: #2166: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB  - PASSED
chains.sh: Creating Intermediate certifiate request CANavyReq.der
certutil -s "CN=CANavy Intermediate, O=CANavy, C=US"  -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CANavyReq.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #2167: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der  - PASSED
chains.sh: Creating certficate CANavyNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 606225659   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.2.0
1

n
y
OID.2.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #2168: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate CANavyNavy.der to CANavyDB database
certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der
chains.sh: #2169: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #2170: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o BridgeReq.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #2171: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy
certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 606225660 -7 Bridge@CAArmy  --extCP --extPM < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.1.1
1

n
n
n
OID.1.1
OID.2.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #2172: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy  - PASSED
chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der
chains.sh: #2173: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeCANavy.der signed by CANavy
certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 606225661 -7 Bridge@CANavy  --extCP --extPM < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.2.0
1

n
y
OID.2.1
1

n
n
n
OID.2.1
OID.1.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #2174: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy  - PASSED
chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der
chains.sh: #2175: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7
chains.sh: #2176: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #2177: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #2178: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 606225662   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.1
1

n
y
OID.2.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #2179: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA1Bridge.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der
chains.sh: #2180: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #2181: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #2182: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 606225663   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #2183: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA2Bridge.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der
chains.sh: #2184: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #2185: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o EE1Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #2186: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 606225664   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.2.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #2187: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #2188: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #2189: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o EE2Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #2190: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 606225665   --extCP < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #2191: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE2CA2.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der
chains.sh: #2192: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags       -o OID.1.0  -t Army.der
vfychain  -pp -vv      -o OID.1.0  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #2193: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags       -o OID.1.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags       -o OID.1.1  -t Army.der
vfychain  -pp -vv      -o OID.1.1  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225656 (0x242244f8)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Mon Jun 06 22:58:51 2016
            Not After : Sun Jun 06 22:58:51 2066
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b1:b7:4c:14:c9:6b:44:1e:5d:23:10:19:d6:1b:74:7d:
                    72:37:40:db:f9:c7:e8:6c:37:35:68:fc:45:9a:38:79:
                    91:2c:75:84:c0:bf:a5:78:8a:0d:72:cb:db:04:ac:36:
                    62:12:bc:b2:ad:e3:53:80:fd:18:78:55:6a:ff:e8:ae:
                    44:d1:bf:3c:10:8a:3b:41:1a:c7:dc:16:05:27:a1:46:
                    31:d2:28:d4:ba:c3:fb:e6:c6:f7:84:a9:a9:16:c8:3c:
                    d7:0b:e4:4c:a8:8f:1d:ff:44:52:5e:4f:3f:d0:f8:68:
                    10:a7:77:8c:7f:60:b1:ce:2c:a7:b7:d5:be:98:2e:93
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:e9:f9:9a:71:28:cc:da:4b:05:b4:72:5b:e4:f8:fe:
        68:df:b7:bc:9b:87:94:26:a3:dc:3c:a1:08:69:a4:ed:
        99:c6:62:91:01:26:cd:e3:59:e4:47:e7:94:f4:81:8b:
        e3:e8:ec:4b:88:75:81:19:76:5a:02:f2:dc:56:63:d4:
        60:6f:0b:72:73:a0:c1:fe:c1:28:53:9a:a8:48:34:15:
        64:d1:ec:0c:23:aa:74:b0:7d:b9:4e:d1:b7:a9:e2:21:
        0e:e7:fa:53:df:ce:21:11:1b:f1:eb:e2:9d:ff:cf:7b:
        09:68:d7:66:3f:90:8d:1b:c3:37:10:81:0f:0e:97:4a
    Fingerprint (MD5):
        A4:3A:BC:90:48:7F:FE:C8:8E:42:B1:3F:99:06:C9:DE
    Fingerprint (SHA1):
        B9:23:1E:37:B8:30:B2:21:E9:8E:03:6E:47:31:26:3E:D3:D6:1F:DC


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US"
Returned value is 0, expected result is pass
chains.sh: #2194: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags       -o OID.1.1  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags       -o OID.2.0  -t Army.der
vfychain  -pp -vv      -o OID.2.0  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #2195: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags       -o OID.2.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags       -o OID.2.1  -t Army.der
vfychain  -pp -vv      -o OID.2.1  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #2196: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags       -o OID.2.1  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags       -o OID.1.0  -t Navy.der
vfychain  -pp -vv      -o OID.1.0  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #2197: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags       -o OID.1.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags       -o OID.1.1  -t Navy.der
vfychain  -pp -vv      -o OID.1.1  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #2198: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags       -o OID.1.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags       -o OID.2.0  -t Navy.der
vfychain  -pp -vv      -o OID.2.0  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #2199: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags       -o OID.2.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags       -o OID.2.1  -t Navy.der
vfychain  -pp -vv      -o OID.2.1  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #2200: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags       -o OID.2.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags       -o OID.1.0  -t Navy.der
vfychain  -pp -vv      -o OID.1.0  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #2201: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags       -o OID.1.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags       -o OID.1.1  -t Navy.der
vfychain  -pp -vv      -o OID.1.1  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #2202: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags       -o OID.1.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags       -o OID.2.0  -t Navy.der
vfychain  -pp -vv      -o OID.2.0  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225657 (0x242244f9)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Mon Jun 06 22:58:51 2016
            Not After : Sun Jun 06 22:58:51 2066
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:b4:c4:04:70:b6:9a:d0:44:22:86:9a:cb:f9:c4:a5:
                    11:f7:c5:1a:ee:8b:69:3c:12:73:8a:ae:e1:11:2d:8c:
                    e9:e8:2f:60:52:10:e0:e4:5e:9c:94:8e:5f:ef:d1:06:
                    2d:64:74:4e:7b:bd:ca:6f:c5:dd:84:19:da:17:a9:73:
                    16:e4:66:c5:4c:a2:39:70:5e:ad:f9:19:c5:97:e8:6b:
                    34:0b:04:c0:b5:48:ae:09:96:34:d8:ef:8d:fd:7e:67:
                    30:65:d2:e6:22:a0:2a:60:0d:bd:97:d7:be:25:bd:19:
                    c9:f9:11:25:71:6e:29:2f:6a:fb:86:97:6e:81:25:1b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9a:3f:d6:4e:8d:93:f4:32:5d:14:67:37:9d:bf:b4:b7:
        7c:f3:36:fb:08:28:5d:9e:f2:1b:1e:0e:f3:c7:d1:68:
        69:c3:8d:27:98:07:c3:ab:49:98:45:0e:4c:f9:e4:35:
        77:64:1e:ad:1b:15:2e:2c:a4:0c:85:ee:bc:dc:a9:1e:
        8c:05:ac:16:66:3d:af:84:0a:70:b4:e9:ec:87:ea:42:
        41:17:75:85:67:bb:04:2f:2a:b8:c1:d7:c0:e6:a6:b8:
        6a:45:5c:f7:c0:df:30:34:a1:5e:1e:41:aa:58:c1:15:
        f7:b4:85:fd:00:28:0c:12:d5:d2:0a:77:f0:a8:3f:9c
    Fingerprint (MD5):
        4A:01:47:51:B6:CA:09:4C:46:D2:F2:DF:0B:FE:EA:EE
    Fingerprint (SHA1):
        BF:4F:58:12:18:70:23:F0:2B:E8:B7:BF:F2:AB:67:EB:36:97:A6:70


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US"
Returned value is 0, expected result is pass
chains.sh: #2203: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags       -o OID.2.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags       -o OID.2.1  -t Navy.der
vfychain  -pp -vv      -o OID.2.1  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #2204: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags       -o OID.2.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags       -o OID.1.0  -t Army.der
vfychain  -pp -vv      -o OID.1.0  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #2205: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags       -o OID.1.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags       -o OID.1.1  -t Army.der
vfychain  -pp -vv      -o OID.1.1  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #2206: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags       -o OID.1.1  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags       -o OID.2.0  -t Army.der
vfychain  -pp -vv      -o OID.2.0  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #2207: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags       -o OID.2.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags       -o OID.2.1  -t Army.der
vfychain  -pp -vv      -o OID.2.1  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #2208: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags       -o OID.2.1  -t Army.der - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #2209: RealCerts: Creating DB AllDB  - PASSED
chains.sh: Importing certificate TestCA.ca.cert to AllDB database
certutil -A -n TestCA.ca  -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /<<PKGBUILDDIR>>/mozilla/security/nss/tests/libpkix/certs/TestCA.ca.cert
chains.sh: #2210: RealCerts: Importing certificate TestCA.ca.cert to AllDB database  - PASSED
chains.sh: Importing certificate TestUser50.cert to AllDB database
certutil -A -n TestUser50  -t "" -d AllDB -f AllDB/dbpasswd -i /<<PKGBUILDDIR>>/mozilla/security/nss/tests/libpkix/certs/TestUser50.cert
chains.sh: #2211: RealCerts: Importing certificate TestUser50.cert to AllDB database  - PASSED
chains.sh: Importing certificate TestUser51.cert to AllDB database
certutil -A -n TestUser51  -t "" -d AllDB -f AllDB/dbpasswd -i /<<PKGBUILDDIR>>/mozilla/security/nss/tests/libpkix/certs/TestUser51.cert
chains.sh: #2212: RealCerts: Importing certificate TestUser51.cert to AllDB database  - PASSED
chains.sh: Importing certificate PayPalRootCA.cert to AllDB database
certutil -A -n PayPalRootCA  -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /<<PKGBUILDDIR>>/mozilla/security/nss/tests/libpkix/certs/PayPalRootCA.cert
chains.sh: #2213: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database  - PASSED
chains.sh: Importing certificate PayPalICA.cert to AllDB database
certutil -A -n PayPalICA  -t "" -d AllDB -f AllDB/dbpasswd -i /<<PKGBUILDDIR>>/mozilla/security/nss/tests/libpkix/certs/PayPalICA.cert
chains.sh: #2214: RealCerts: Importing certificate PayPalICA.cert to AllDB database  - PASSED
chains.sh: Importing certificate PayPalEE.cert to AllDB database
certutil -A -n PayPalEE  -t "" -d AllDB -f AllDB/dbpasswd -i /<<PKGBUILDDIR>>/mozilla/security/nss/tests/libpkix/certs/PayPalEE.cert
chains.sh: #2215: RealCerts: Importing certificate PayPalEE.cert to AllDB database  - PASSED
chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database
certutil -A -n BrAirWaysBadSig  -t "" -d AllDB -f AllDB/dbpasswd -i /<<PKGBUILDDIR>>/mozilla/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert
chains.sh: #2216: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  TestUser50.cert with flags   -d AllDB    
vfychain -d AllDB -pp -vv       /<<PKGBUILDDIR>>/mozilla/security/nss/tests/libpkix/certs/TestUser50.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. TestUser50 :
Email Address(es): testuser50@bogus.com
  ERROR -8181: Peer's Certificate has expired.
Returned value is 1, expected result is pass
chains.sh: #2217: RealCerts: Verifying certificate(s)  TestUser50.cert with flags   -d AllDB     - FAILED
chains.sh: Verifying certificate(s)  TestUser51.cert with flags   -d AllDB    
vfychain -d AllDB -pp -vv       /<<PKGBUILDDIR>>/mozilla/security/nss/tests/libpkix/certs/TestUser51.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. TestUser51 :
Email Address(es): testuser51@bogus.com
  ERROR -8181: Peer's Certificate has expired.
Returned value is 1, expected result is pass
chains.sh: #2218: RealCerts: Verifying certificate(s)  TestUser51.cert with flags   -d AllDB     - FAILED
chains.sh: Verifying certificate(s)  PayPalEE.cert with flags   -d AllDB    -o OID.2.16.840.1.113733.1.7.23.6 
vfychain -d AllDB -pp -vv      -o OID.2.16.840.1.113733.1.7.23.6  /<<PKGBUILDDIR>>/mozilla/security/nss/tests/libpkix/certs/PayPalEE.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. PayPalEE :
  ERROR -8181: Peer's Certificate has expired.
Returned value is 1, expected result is pass
chains.sh: #2219: RealCerts: Verifying certificate(s)  PayPalEE.cert with flags   -d AllDB    -o OID.2.16.840.1.113733.1.7.23.6  - FAILED
chains.sh: Verifying certificate(s)  BrAirWaysBadSig.cert with flags   -d AllDB    
vfychain -d AllDB -pp -vv       /<<PKGBUILDDIR>>/mozilla/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. BrAirWaysBadSig :
  ERROR -8181: Peer's Certificate has expired.
Returned value is 1, expected result is fail
chains.sh: #2220: RealCerts: Verifying certificate(s)  BrAirWaysBadSig.cert with flags   -d AllDB     - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #2221: DSA: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -m 606225666 < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #2222: DSA: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #2223: DSA: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #2224: DSA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #2225: DSA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 606225667   < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #2226: DSA: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #2227: DSA: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #2228: DSA: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R  -d EE1DB -f EE1DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o EE1Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #2229: DSA: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 606225668   < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #2230: DSA: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #2231: DSA: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #2232: DSA: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #2233: DSA: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 606225669   < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #2234: DSA: Creating certficate CA2Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA2Root.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der
chains.sh: #2235: DSA: Importing certificate CA2Root.der to CA2DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #2236: DSA: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R  -d EE2DB -f EE2DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o EE2Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #2237: DSA: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 606225670   < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #2238: DSA: Creating certficate EE2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE2CA2.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der
chains.sh: #2239: DSA: Importing certificate EE2CA2.der to EE2DB database  - PASSED
chains.sh: Creating DB CA3DB
certutil -N -d CA3DB -f CA3DB/dbpasswd
chains.sh: #2240: DSA: Creating DB CA3DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA3Req.der
certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA3Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #2241: DSA: Creating Intermediate certifiate request CA3Req.der  - PASSED
chains.sh: Creating certficate CA3Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 606225671   < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #2242: DSA: Creating certficate CA3Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA3Root.der to CA3DB database
certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der
chains.sh: #2243: DSA: Importing certificate CA3Root.der to CA3DB database  - PASSED
chains.sh: Creating DB EE3DB
certutil -N -d EE3DB -f EE3DB/dbpasswd
chains.sh: #2244: DSA: Creating DB EE3DB  - PASSED
chains.sh: Creating EE certifiate request EE3Req.der
certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R  -d EE3DB -f EE3DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o EE3Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #2245: DSA: Creating EE certifiate request EE3Req.der  - PASSED
chains.sh: Creating certficate EE3CA3.der signed by CA3
certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 606225672   < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #2246: DSA: Creating certficate EE3CA3.der signed by CA3  - PASSED
chains.sh: Importing certificate EE3CA3.der to EE3DB database
certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der
chains.sh: #2247: DSA: Importing certificate EE3CA3.der to EE3DB database  - PASSED
chains.sh: Creating DB CA4DB
certutil -N -d CA4DB -f CA4DB/dbpasswd
chains.sh: #2248: DSA: Creating DB CA4DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA4Req.der
certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA4Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #2249: DSA: Creating Intermediate certifiate request CA4Req.der  - PASSED
chains.sh: Creating certficate CA4Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 606225673   < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #2250: DSA: Creating certficate CA4Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA4Root.der to CA4DB database
certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der
chains.sh: #2251: DSA: Importing certificate CA4Root.der to CA4DB database  - PASSED
chains.sh: Creating DB EE4DB
certutil -N -d EE4DB -f EE4DB/dbpasswd
chains.sh: #2252: DSA: Creating DB EE4DB  - PASSED
chains.sh: Creating EE certifiate request EE4Req.der
certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R  -d EE4DB -f EE4DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o EE4Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #2253: DSA: Creating EE certifiate request EE4Req.der  - PASSED
chains.sh: Creating certficate EE4CA4.der signed by CA4
certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 606225674   < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #2254: DSA: Creating certficate EE4CA4.der signed by CA4  - PASSED
chains.sh: Importing certificate EE4CA4.der to EE4DB database
certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der
chains.sh: #2255: DSA: Importing certificate EE4CA4.der to EE4DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #2256: DSA: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Root.der with flags   -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv       EE1CA1.der CA1Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225666 (0x24224502)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Mon Jun 06 22:59:10 2016
            Not After : Sun Jun 06 22:59:10 2066
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44:
                    db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb:
                    c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f:
                    41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69:
                    fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8:
                    89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3:
                    c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52:
                    29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db:
                    ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44:
                    29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02:
                    81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:
                    00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:
                    f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:
                    31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:
                    da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:
                    54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:
                    83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:
                    f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:
                    a5:10
            DSA Public Key:
                Prime:
                    98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c:
                    b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04:
                    82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f:
                    af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a:
                    4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad:
                    af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65:
                    c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe:
                    18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d
                Subprime:
                    b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1:
                    76:27:03:81
                Base:
                    04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04:
                    4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c:
                    f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50:
                    82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e:
                    57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b:
                    5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87:
                    60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb:
                    35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10
                PublicValue:
                    6d:7e:a4:83:91:92:79:f6:2f:07:10:a8:30:a3:fa:21:
                    df:a7:a9:18:45:75:e1:12:f7:8d:f3:d7:cf:02:c9:a7:
                    8c:81:cb:19:fc:3d:88:cb:a1:51:35:11:27:06:20:09:
                    6c:04:58:8b:38:f1:59:05:10:d8:6d:c3:b6:57:2f:b5:
                    5e:38:ce:8f:7b:f9:28:e2:67:9b:b6:aa:91:5b:f0:c9:
                    6d:ad:2d:1f:2b:47:e9:66:d4:50:d2:89:2c:53:ab:23:
                    1b:7f:4b:d8:b8:eb:f6:aa:a0:96:d2:20:66:6d:c5:d3:
                    19:32:89:01:7e:f5:cb:bd:3f:9d:86:c0:90:fe:31:d4
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:2d:02:15:00:9b:9f:9c:41:7c:66:90:98:ab:a2:53:
        99:9f:dd:ff:9c:b7:bf:31:87:02:14:0a:f5:73:7a:eb:
        b0:76:79:4d:31:08:51:38:fc:58:0d:49:f7:ac:d5
    Fingerprint (MD5):
        A5:B7:56:9E:7B:91:4A:9A:D4:E9:70:D2:93:00:7C:58
    Fingerprint (SHA1):
        20:82:32:11:76:09:6E:D6:95:0C:5D:CB:31:C4:46:27:13:72:17:68


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #2257: DSA: Verifying certificate(s)  EE1CA1.der CA1Root.der with flags   -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Root.der with flags   -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv       EE2CA2.der CA2Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225666 (0x24224502)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Mon Jun 06 22:59:10 2016
            Not After : Sun Jun 06 22:59:10 2066
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44:
                    db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb:
                    c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f:
                    41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69:
                    fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8:
                    89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3:
                    c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52:
                    29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db:
                    ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44:
                    29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02:
                    81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:
                    00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:
                    f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:
                    31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:
                    da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:
                    54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:
                    83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:
                    f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:
                    a5:10
            DSA Public Key:
                Prime:
                    98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c:
                    b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04:
                    82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f:
                    af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a:
                    4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad:
                    af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65:
                    c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe:
                    18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d
                Subprime:
                    b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1:
                    76:27:03:81
                Base:
                    04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04:
                    4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c:
                    f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50:
                    82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e:
                    57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b:
                    5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87:
                    60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb:
                    35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10
                PublicValue:
                    6d:7e:a4:83:91:92:79:f6:2f:07:10:a8:30:a3:fa:21:
                    df:a7:a9:18:45:75:e1:12:f7:8d:f3:d7:cf:02:c9:a7:
                    8c:81:cb:19:fc:3d:88:cb:a1:51:35:11:27:06:20:09:
                    6c:04:58:8b:38:f1:59:05:10:d8:6d:c3:b6:57:2f:b5:
                    5e:38:ce:8f:7b:f9:28:e2:67:9b:b6:aa:91:5b:f0:c9:
                    6d:ad:2d:1f:2b:47:e9:66:d4:50:d2:89:2c:53:ab:23:
                    1b:7f:4b:d8:b8:eb:f6:aa:a0:96:d2:20:66:6d:c5:d3:
                    19:32:89:01:7e:f5:cb:bd:3f:9d:86:c0:90:fe:31:d4
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:2d:02:15:00:9b:9f:9c:41:7c:66:90:98:ab:a2:53:
        99:9f:dd:ff:9c:b7:bf:31:87:02:14:0a:f5:73:7a:eb:
        b0:76:79:4d:31:08:51:38:fc:58:0d:49:f7:ac:d5
    Fingerprint (MD5):
        A5:B7:56:9E:7B:91:4A:9A:D4:E9:70:D2:93:00:7C:58
    Fingerprint (SHA1):
        20:82:32:11:76:09:6E:D6:95:0C:5D:CB:31:C4:46:27:13:72:17:68


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #2258: DSA: Verifying certificate(s)  EE2CA2.der CA2Root.der with flags   -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA3.der CA3Root.der with flags   -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv       EE3CA3.der CA3Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225666 (0x24224502)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Mon Jun 06 22:59:10 2016
            Not After : Sun Jun 06 22:59:10 2066
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44:
                    db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb:
                    c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f:
                    41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69:
                    fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8:
                    89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3:
                    c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52:
                    29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db:
                    ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44:
                    29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02:
                    81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:
                    00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:
                    f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:
                    31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:
                    da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:
                    54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:
                    83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:
                    f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:
                    a5:10
            DSA Public Key:
                Prime:
                    98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c:
                    b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04:
                    82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f:
                    af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a:
                    4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad:
                    af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65:
                    c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe:
                    18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d
                Subprime:
                    b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1:
                    76:27:03:81
                Base:
                    04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04:
                    4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c:
                    f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50:
                    82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e:
                    57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b:
                    5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87:
                    60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb:
                    35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10
                PublicValue:
                    6d:7e:a4:83:91:92:79:f6:2f:07:10:a8:30:a3:fa:21:
                    df:a7:a9:18:45:75:e1:12:f7:8d:f3:d7:cf:02:c9:a7:
                    8c:81:cb:19:fc:3d:88:cb:a1:51:35:11:27:06:20:09:
                    6c:04:58:8b:38:f1:59:05:10:d8:6d:c3:b6:57:2f:b5:
                    5e:38:ce:8f:7b:f9:28:e2:67:9b:b6:aa:91:5b:f0:c9:
                    6d:ad:2d:1f:2b:47:e9:66:d4:50:d2:89:2c:53:ab:23:
                    1b:7f:4b:d8:b8:eb:f6:aa:a0:96:d2:20:66:6d:c5:d3:
                    19:32:89:01:7e:f5:cb:bd:3f:9d:86:c0:90:fe:31:d4
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:2d:02:15:00:9b:9f:9c:41:7c:66:90:98:ab:a2:53:
        99:9f:dd:ff:9c:b7:bf:31:87:02:14:0a:f5:73:7a:eb:
        b0:76:79:4d:31:08:51:38:fc:58:0d:49:f7:ac:d5
    Fingerprint (MD5):
        A5:B7:56:9E:7B:91:4A:9A:D4:E9:70:D2:93:00:7C:58
    Fingerprint (SHA1):
        20:82:32:11:76:09:6E:D6:95:0C:5D:CB:31:C4:46:27:13:72:17:68


Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Returned value is 0, expected result is pass
chains.sh: #2259: DSA: Verifying certificate(s)  EE3CA3.der CA3Root.der with flags   -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA4.der CA4Root.der with flags   -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv       EE4CA4.der CA4Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225666 (0x24224502)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Mon Jun 06 22:59:10 2016
            Not After : Sun Jun 06 22:59:10 2066
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44:
                    db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb:
                    c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f:
                    41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69:
                    fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8:
                    89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3:
                    c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52:
                    29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db:
                    ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44:
                    29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02:
                    81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:
                    00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:
                    f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:
                    31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:
                    da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:
                    54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:
                    83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:
                    f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:
                    a5:10
            DSA Public Key:
                Prime:
                    98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c:
                    b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04:
                    82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f:
                    af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a:
                    4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad:
                    af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65:
                    c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe:
                    18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d
                Subprime:
                    b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1:
                    76:27:03:81
                Base:
                    04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04:
                    4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c:
                    f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50:
                    82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e:
                    57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b:
                    5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87:
                    60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb:
                    35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10
                PublicValue:
                    6d:7e:a4:83:91:92:79:f6:2f:07:10:a8:30:a3:fa:21:
                    df:a7:a9:18:45:75:e1:12:f7:8d:f3:d7:cf:02:c9:a7:
                    8c:81:cb:19:fc:3d:88:cb:a1:51:35:11:27:06:20:09:
                    6c:04:58:8b:38:f1:59:05:10:d8:6d:c3:b6:57:2f:b5:
                    5e:38:ce:8f:7b:f9:28:e2:67:9b:b6:aa:91:5b:f0:c9:
                    6d:ad:2d:1f:2b:47:e9:66:d4:50:d2:89:2c:53:ab:23:
                    1b:7f:4b:d8:b8:eb:f6:aa:a0:96:d2:20:66:6d:c5:d3:
                    19:32:89:01:7e:f5:cb:bd:3f:9d:86:c0:90:fe:31:d4
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:2d:02:15:00:9b:9f:9c:41:7c:66:90:98:ab:a2:53:
        99:9f:dd:ff:9c:b7:bf:31:87:02:14:0a:f5:73:7a:eb:
        b0:76:79:4d:31:08:51:38:fc:58:0d:49:f7:ac:d5
    Fingerprint (MD5):
        A5:B7:56:9E:7B:91:4A:9A:D4:E9:70:D2:93:00:7C:58
    Fingerprint (SHA1):
        20:82:32:11:76:09:6E:D6:95:0C:5D:CB:31:C4:46:27:13:72:17:68


Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US"
Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US"
Returned value is 0, expected result is pass
chains.sh: #2260: DSA: Verifying certificate(s)  EE4CA4.der CA4Root.der with flags   -d AllDB     -t Root.der - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #2261: Revocation: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -m 10 < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #2262: Revocation: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #2263: Revocation: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA0DB
certutil -N -d CA0DB -f CA0DB/dbpasswd
chains.sh: #2264: Revocation: Creating DB CA0DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA0Req.der
certutil -s "CN=CA0 Intermediate, O=CA0, C=US"  -R -2 -d CA0DB -f CA0DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA0Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #2265: Revocation: Creating Intermediate certifiate request CA0Req.der  - PASSED
chains.sh: Creating certficate CA0Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11   < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #2266: Revocation: Creating certficate CA0Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA0Root.der to CA0DB database
certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der
chains.sh: #2267: Revocation: Importing certificate CA0Root.der to CA0DB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #2268: Revocation: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #2269: Revocation: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12   < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #2270: Revocation: Creating certficate CA1CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA1CA0.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der
chains.sh: #2271: Revocation: Importing certificate CA1CA0.der to CA1DB database  - PASSED
chains.sh: Creating DB EE11DB
certutil -N -d EE11DB -f EE11DB/dbpasswd
chains.sh: #2272: Revocation: Creating DB EE11DB  - PASSED
chains.sh: Creating EE certifiate request EE11Req.der
certutil -s "CN=EE11 EE, O=EE11, C=US"  -R  -d EE11DB -f EE11DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o EE11Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #2273: Revocation: Creating EE certifiate request EE11Req.der  - PASSED
chains.sh: Creating certficate EE11CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13   < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #2274: Revocation: Creating certficate EE11CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE11CA1.der to EE11DB database
certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der
chains.sh: #2275: Revocation: Importing certificate EE11CA1.der to EE11DB database  - PASSED
chains.sh: Creating DB EE12DB
certutil -N -d EE12DB -f EE12DB/dbpasswd
chains.sh: #2276: Revocation: Creating DB EE12DB  - PASSED
chains.sh: Creating EE certifiate request EE12Req.der
certutil -s "CN=EE12 EE, O=EE12, C=US"  -R  -d EE12DB -f EE12DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o EE12Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #2277: Revocation: Creating EE certifiate request EE12Req.der  - PASSED
chains.sh: Creating certficate EE12CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14   < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #2278: Revocation: Creating certficate EE12CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE12CA1.der to EE12DB database
certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der
chains.sh: #2279: Revocation: Importing certificate EE12CA1.der to EE12DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #2280: Revocation: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #2281: Revocation: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15   < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #2282: Revocation: Creating certficate CA2CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA2CA0.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der
chains.sh: #2283: Revocation: Importing certificate CA2CA0.der to CA2DB database  - PASSED
chains.sh: Creating DB EE21DB
certutil -N -d EE21DB -f EE21DB/dbpasswd
chains.sh: #2284: Revocation: Creating DB EE21DB  - PASSED
chains.sh: Creating EE certifiate request EE21Req.der
certutil -s "CN=EE21 EE, O=EE21, C=US"  -R  -d EE21DB -f EE21DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o EE21Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #2285: Revocation: Creating EE certifiate request EE21Req.der  - PASSED
chains.sh: Creating certficate EE21CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16   < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #2286: Revocation: Creating certficate EE21CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE21CA2.der to EE21DB database
certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der
chains.sh: #2287: Revocation: Importing certificate EE21CA2.der to EE21DB database  - PASSED
chains.sh: Create CRL for RootDB
crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl
=== Crlutil input data ===
update=20160606225930Z
nextupdate=20170606225930Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=Root ROOT CA,O=Root,C=US"
    This Update: Mon Jun 06 22:59:30 2016
    Next Update: Tue Jun 06 22:59:30 2017
    CRL Extensions:
chains.sh: #2288: Revocation: Create CRL for RootDB  - PASSED
chains.sh: Create CRL for CA0DB
crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20160606225930Z
nextupdate=20170606225930Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Mon Jun 06 22:59:30 2016
    Next Update: Tue Jun 06 22:59:30 2017
    CRL Extensions:
chains.sh: #2289: Revocation: Create CRL for CA0DB  - PASSED
chains.sh: Create CRL for CA1DB
crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl
=== Crlutil input data ===
update=20160606225930Z
nextupdate=20170606225930Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
    This Update: Mon Jun 06 22:59:30 2016
    Next Update: Tue Jun 06 22:59:30 2017
    CRL Extensions:
chains.sh: #2290: Revocation: Create CRL for CA1DB  - PASSED
chains.sh: Create CRL for CA2DB
crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl
=== Crlutil input data ===
update=20160606225930Z
nextupdate=20170606225930Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA2 Intermediate,O=CA2,C=US"
    This Update: Mon Jun 06 22:59:30 2016
    Next Update: Tue Jun 06 22:59:30 2017
    CRL Extensions:
chains.sh: #2291: Revocation: Create CRL for CA2DB  - PASSED
chains.sh: Revoking certificate with SN 14 issued by CA1
crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl
=== Crlutil input data ===
update=20160606225932Z
addcert 14 20160606225932Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
    This Update: Mon Jun 06 22:59:32 2016
    Next Update: Tue Jun 06 22:59:30 2017
    Entry 1 (0x1):
        Serial Number: 14 (0xe)
        Revocation Date: Mon Jun 06 22:59:32 2016
    CRL Extensions:
chains.sh: #2292: Revocation: Revoking certificate with SN 14 issued by CA1  - PASSED
chains.sh: Revoking certificate with SN 15 issued by CA0
crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20160606225933Z
addcert 15 20160606225933Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Mon Jun 06 22:59:33 2016
    Next Update: Tue Jun 06 22:59:30 2017
    Entry 1 (0x1):
        Serial Number: 15 (0xf)
        Revocation Date: Mon Jun 06 22:59:33 2016
    CRL Extensions:
chains.sh: #2293: Revocation: Revoking certificate with SN 15 issued by CA0  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #2294: Revocation: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #2295: Revocation: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing CRL Root.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl
chains.sh: #2296: Revocation: Importing CRL Root.crl to AllDB database  - PASSED
chains.sh: Importing certificate CA0Root.der to AllDB database
certutil -A -n CA0  -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der
chains.sh: #2297: Revocation: Importing certificate CA0Root.der to AllDB database  - PASSED
chains.sh: Importing CRL CA0.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl
chains.sh: #2298: Revocation: Importing CRL CA0.crl to AllDB database  - PASSED
chains.sh: Importing certificate CA1CA0.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der
chains.sh: #2299: Revocation: Importing certificate CA1CA0.der to AllDB database  - PASSED
chains.sh: Importing CRL CA1.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl
chains.sh: #2300: Revocation: Importing CRL CA1.crl to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA0.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der
chains.sh: #2301: Revocation: Importing certificate CA2CA0.der to AllDB database  - PASSED
chains.sh: Importing CRL CA2.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl
chains.sh: #2302: Revocation: Importing CRL CA2.crl to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  EE11CA1.der with flags   -g leaf -m crl -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv   -g leaf -m crl     EE11CA1.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 10 (0xa)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Mon Jun 06 22:59:20 2016
            Not After : Sun Jun 06 22:59:20 2066
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a5:30:a5:88:49:4a:90:1e:35:1b:11:02:3b:00:50:14:
                    97:21:bf:c6:80:26:37:f1:76:e2:b8:91:d2:de:f4:87:
                    4e:2e:a5:99:87:60:7d:ef:85:7b:24:47:bc:77:e0:b7:
                    b3:9b:a2:36:a1:32:a5:d1:a1:a9:47:98:59:dd:71:db:
                    3d:3a:9f:05:38:9b:fa:9d:9a:58:f5:a6:5b:5e:e6:30:
                    29:e0:b6:c2:a4:c9:21:2c:46:c5:0d:1f:60:9f:8e:e5:
                    7f:05:86:9a:d8:3a:a4:2c:d6:15:25:a7:da:ab:bf:e4:
                    94:05:2c:55:de:7c:07:78:0c:b4:df:84:c2:e5:4c:45
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        34:12:25:07:fa:7c:09:13:8a:12:fc:c1:45:5c:f9:88:
        5c:95:df:b2:ab:8b:a9:aa:27:6d:26:0a:99:f4:ea:75:
        b4:66:65:42:45:4a:f9:cd:6f:6b:36:67:2e:6e:66:c7:
        0b:b3:91:3e:db:76:75:28:2e:6b:ad:39:ae:36:7a:9c:
        b9:9b:c7:4c:5c:9b:17:69:39:d7:1c:28:32:57:82:e4:
        ca:79:c7:bf:b1:c9:27:76:1d:0a:b4:f9:4e:98:d7:df:
        25:11:19:7c:0d:9f:93:82:3d:4b:54:a2:f4:14:a3:85:
        a9:c3:75:70:fe:31:3f:35:2f:87:35:ad:fc:48:9a:f8
    Fingerprint (MD5):
        8B:86:BE:B0:13:BF:D4:45:94:7B:8C:E8:D6:71:94:BA
    Fingerprint (SHA1):
        5A:A3:67:BF:45:AB:03:62:B4:23:F8:6A:B1:A7:A7:4A:29:A9:FA:49

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #2303: Revocation: Verifying certificate(s)  EE11CA1.der with flags   -g leaf -m crl -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE12CA1.der with flags   -g leaf -m crl -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv   -g leaf -m crl     EE12CA1.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #2304: Revocation: Verifying certificate(s)  EE12CA1.der with flags   -g leaf -m crl -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE11CA1.der with flags   -g chain -m crl -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv   -g chain -m crl     EE11CA1.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 10 (0xa)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Mon Jun 06 22:59:20 2016
            Not After : Sun Jun 06 22:59:20 2066
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a5:30:a5:88:49:4a:90:1e:35:1b:11:02:3b:00:50:14:
                    97:21:bf:c6:80:26:37:f1:76:e2:b8:91:d2:de:f4:87:
                    4e:2e:a5:99:87:60:7d:ef:85:7b:24:47:bc:77:e0:b7:
                    b3:9b:a2:36:a1:32:a5:d1:a1:a9:47:98:59:dd:71:db:
                    3d:3a:9f:05:38:9b:fa:9d:9a:58:f5:a6:5b:5e:e6:30:
                    29:e0:b6:c2:a4:c9:21:2c:46:c5:0d:1f:60:9f:8e:e5:
                    7f:05:86:9a:d8:3a:a4:2c:d6:15:25:a7:da:ab:bf:e4:
                    94:05:2c:55:de:7c:07:78:0c:b4:df:84:c2:e5:4c:45
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        34:12:25:07:fa:7c:09:13:8a:12:fc:c1:45:5c:f9:88:
        5c:95:df:b2:ab:8b:a9:aa:27:6d:26:0a:99:f4:ea:75:
        b4:66:65:42:45:4a:f9:cd:6f:6b:36:67:2e:6e:66:c7:
        0b:b3:91:3e:db:76:75:28:2e:6b:ad:39:ae:36:7a:9c:
        b9:9b:c7:4c:5c:9b:17:69:39:d7:1c:28:32:57:82:e4:
        ca:79:c7:bf:b1:c9:27:76:1d:0a:b4:f9:4e:98:d7:df:
        25:11:19:7c:0d:9f:93:82:3d:4b:54:a2:f4:14:a3:85:
        a9:c3:75:70:fe:31:3f:35:2f:87:35:ad:fc:48:9a:f8
    Fingerprint (MD5):
        8B:86:BE:B0:13:BF:D4:45:94:7B:8C:E8:D6:71:94:BA
    Fingerprint (SHA1):
        5A:A3:67:BF:45:AB:03:62:B4:23:F8:6A:B1:A7:A7:4A:29:A9:FA:49

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #2305: Revocation: Verifying certificate(s)  EE11CA1.der with flags   -g chain -m crl -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE21CA2.der with flags   -g chain -m crl -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv   -g chain -m crl     EE21CA2.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #2306: Revocation: Verifying certificate(s)  EE21CA2.der with flags   -g chain -m crl -d AllDB     -t Root.der - PASSED
tstclnt: Client timed out while waiting for connection to server: TCP connection reset by peer
chains.sh: #2307: Test that OCSP server is reachable - FAILED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #2308: CRLDP: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -m 606225675 < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #2309: CRLDP: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #2310: CRLDP: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA0DB
certutil -N -d CA0DB -f CA0DB/dbpasswd
chains.sh: #2311: CRLDP: Creating DB CA0DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA0Req.der
certutil -s "CN=CA0 Intermediate, O=CA0, C=US"  -R -2 -d CA0DB -f CA0DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA0Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #2312: CRLDP: Creating Intermediate certifiate request CA0Req.der  - PASSED
chains.sh: Creating certficate CA0Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 606225676   < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #2313: CRLDP: Creating certficate CA0Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA0Root.der to CA0DB database
certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der
chains.sh: #2314: CRLDP: Importing certificate CA0Root.der to CA0DB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #2315: CRLDP: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA1Req.der  -4 < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y
1
7
http://127.0.0.1:8641/testbuildd-1853-CA0-606225565.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
Enter the type of the distribution point name:
	1 - Full Name
	2 - Relative Name
	Any other number to finish
		Choice:  > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Select one of the following for the reason flags
	0 - unused
	1 - keyCompromise
	2 - caCompromise
	3 - affiliationChanged
	4 - superseded
	5 - cessationOfOperation
	6 - certificateHold
	Any other number to finish		Choice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #2316: CRLDP: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10   --extAIA < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/testbuildd-1853-CA0Root-606225552.der
0
n
n
===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #2317: CRLDP: Creating certficate CA1CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA1CA0.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der
chains.sh: #2318: CRLDP: Importing certificate CA1CA0.der to CA1DB database  - PASSED
chains.sh: Creating DB EE11DB
certutil -N -d EE11DB -f EE11DB/dbpasswd
chains.sh: #2319: CRLDP: Creating DB EE11DB  - PASSED
chains.sh: Creating EE certifiate request EE11Req.der
certutil -s "CN=EE11 EE, O=EE11, C=US"  -R  -d EE11DB -f EE11DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o EE11Req.der  -4 < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/testbuildd-1853-CA0-606225565.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
	1 - Full Name
	2 - Relative Name
	Any other number to finish
		Choice:  > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Select one of the following for the reason flags
	0 - unused
	1 - keyCompromise
	2 - caCompromise
	3 - affiliationChanged
	4 - superseded
	5 - cessationOfOperation
	6 - certificateHold
	Any other number to finish		Choice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #2320: CRLDP: Creating EE certifiate request EE11Req.der  - PASSED
chains.sh: Creating certficate EE11CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 606225677   < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #2321: CRLDP: Creating certficate EE11CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE11CA1.der to EE11DB database
certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der
chains.sh: #2322: CRLDP: Importing certificate EE11CA1.der to EE11DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #2323: CRLDP: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA2Req.der  -4 < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y
1
7
http://127.0.0.1:8641/testbuildd-1853-CA0-606225565.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
Enter the type of the distribution point name:
	1 - Full Name
	2 - Relative Name
	Any other number to finish
		Choice:  > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Select one of the following for the reason flags
	0 - unused
	1 - keyCompromise
	2 - caCompromise
	3 - affiliationChanged
	4 - superseded
	5 - cessationOfOperation
	6 - certificateHold
	Any other number to finish		Choice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #2324: CRLDP: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20   --extAIA < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/testbuildd-1853-CA0Root-606225553.der
0
n
n
===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #2325: CRLDP: Creating certficate CA2CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA2CA0.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der
chains.sh: #2326: CRLDP: Importing certificate CA2CA0.der to CA2DB database  - PASSED
chains.sh: Creating DB EE21DB
certutil -N -d EE21DB -f EE21DB/dbpasswd
chains.sh: #2327: CRLDP: Creating DB EE21DB  - PASSED
chains.sh: Creating EE certifiate request EE21Req.der
certutil -s "CN=EE21 EE, O=EE21, C=US"  -R  -d EE21DB -f EE21DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o EE21Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #2328: CRLDP: Creating EE certifiate request EE21Req.der  - PASSED
chains.sh: Creating certficate EE21CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 606225678   < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #2329: CRLDP: Creating certficate EE21CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE21CA2.der to EE21DB database
certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der
chains.sh: #2330: CRLDP: Importing certificate EE21CA2.der to EE21DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #2331: CRLDP: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o EE1Req.der  -4 < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/testbuildd-1853-CA0-606225565.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
	1 - Full Name
	2 - Relative Name
	Any other number to finish
		Choice:  > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Select one of the following for the reason flags
	0 - unused
	1 - keyCompromise
	2 - caCompromise
	3 - affiliationChanged
	4 - superseded
	5 - cessationOfOperation
	6 - certificateHold
	Any other number to finish		Choice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #2332: CRLDP: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30   --extAIA < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/testbuildd-1853-CA0Root-606225554.der
0
n
n
===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #2333: CRLDP: Creating certficate EE1CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate EE1CA0.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der
chains.sh: #2334: CRLDP: Importing certificate EE1CA0.der to EE1DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #2335: CRLDP: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o EE2Req.der  -4 < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/testbuildd-1853-CA0-606225565.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
	1 - Full Name
	2 - Relative Name
	Any other number to finish
		Choice:  > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Select one of the following for the reason flags
	0 - unused
	1 - keyCompromise
	2 - caCompromise
	3 - affiliationChanged
	4 - superseded
	5 - cessationOfOperation
	6 - certificateHold
	Any other number to finish		Choice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #2336: CRLDP: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40   --extAIA < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/testbuildd-1853-CA0Root-606225555.der
0
n
n
===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #2337: CRLDP: Creating certficate EE2CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate EE2CA0.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der
chains.sh: #2338: CRLDP: Importing certificate EE2CA0.der to EE2DB database  - PASSED
chains.sh: Create CRL for RootDB
crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl
=== Crlutil input data ===
update=20160606225948Z
nextupdate=20170606225948Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=Root ROOT CA,O=Root,C=US"
    This Update: Mon Jun 06 22:59:48 2016
    Next Update: Tue Jun 06 22:59:48 2017
    CRL Extensions:
chains.sh: #2339: CRLDP: Create CRL for RootDB  - PASSED
chains.sh: Create CRL for CA0DB
crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20160606225948Z
nextupdate=20170606225948Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Mon Jun 06 22:59:48 2016
    Next Update: Tue Jun 06 22:59:48 2017
    CRL Extensions:
chains.sh: #2340: CRLDP: Create CRL for CA0DB  - PASSED
chains.sh: Create CRL for CA1DB
crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl
=== Crlutil input data ===
update=20160606225948Z
nextupdate=20170606225948Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
    This Update: Mon Jun 06 22:59:48 2016
    Next Update: Tue Jun 06 22:59:48 2017
    CRL Extensions:
chains.sh: #2341: CRLDP: Create CRL for CA1DB  - PASSED
chains.sh: Create CRL for CA2DB
crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl
=== Crlutil input data ===
update=20160606225948Z
nextupdate=20170606225948Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA2 Intermediate,O=CA2,C=US"
    This Update: Mon Jun 06 22:59:48 2016
    Next Update: Tue Jun 06 22:59:48 2017
    CRL Extensions:
chains.sh: #2342: CRLDP: Create CRL for CA2DB  - PASSED
chains.sh: Revoking certificate with SN 20 issued by CA0
crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20160606225949Z
addcert 20 20160606225949Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Mon Jun 06 22:59:49 2016
    Next Update: Tue Jun 06 22:59:48 2017
    Entry 1 (0x1):
        Serial Number: 20 (0x14)
        Revocation Date: Mon Jun 06 22:59:49 2016
    CRL Extensions:
chains.sh: #2343: CRLDP: Revoking certificate with SN 20 issued by CA0  - PASSED
chains.sh: Revoking certificate with SN 40 issued by CA0
crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20160606225950Z
addcert 40 20160606225950Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Mon Jun 06 22:59:50 2016
    Next Update: Tue Jun 06 22:59:48 2017
    Entry 1 (0x1):
        Serial Number: 20 (0x14)
        Revocation Date: Mon Jun 06 22:59:49 2016
    Entry 2 (0x2):
        Serial Number: 40 (0x28)
        Revocation Date: Mon Jun 06 22:59:50 2016
    CRL Extensions:
chains.sh: #2344: CRLDP: Revoking certificate with SN 40 issued by CA0  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #2345: CRLDP: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #2346: CRLDP: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing CRL Root.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl
chains.sh: #2347: CRLDP: Importing CRL Root.crl to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  EE11CA1.der CA1CA0.der with flags   -g chain -h requireFreshInfo -m crl -d AllDB -f    -t Root.der
vfychain -d AllDB -pp -vv   -g chain -h requireFreshInfo -m crl -f    EE11CA1.der CA1CA0.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225675 (0x2422450b)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Mon Jun 06 22:59:37 2016
            Not After : Sun Jun 06 22:59:37 2066
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    9b:2a:70:23:8e:4b:86:13:1e:07:5a:69:8d:cc:cf:56:
                    14:5a:90:75:5e:37:7c:c5:0f:56:a2:76:5b:3e:33:46:
                    95:44:d0:ee:b6:d6:15:93:ce:e4:4d:c5:3b:c2:1d:30:
                    8f:bb:8b:00:f3:b9:ed:19:29:28:e0:1e:de:e7:ab:1f:
                    e7:22:04:57:a0:11:a5:8a:43:2a:22:68:10:59:b5:fe:
                    95:04:06:01:b3:6b:2d:62:ec:cd:3f:7a:6b:1e:a9:89:
                    f0:8b:37:f8:b9:b3:94:32:45:1f:dd:50:d4:05:b8:0f:
                    51:98:90:89:6c:7c:4b:f7:32:31:b0:37:ac:71:72:2d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        4f:05:f8:fe:65:7c:ff:a7:30:31:d5:79:a8:22:5a:e0:
        da:8f:5b:46:2e:0b:d2:3b:87:67:68:68:26:e9:7b:db:
        76:9c:87:9e:57:42:b9:ac:70:bf:d4:00:75:b6:c8:60:
        92:c6:34:cd:01:b8:f1:67:55:f0:b8:53:b6:fc:cc:03:
        a9:90:f3:71:7e:d6:bb:9e:5e:3c:cc:23:6f:b6:c4:0d:
        e9:ad:7d:d2:d8:c6:da:a9:8f:5d:1b:96:aa:9b:08:1a:
        9a:63:4a:c1:96:2a:48:c1:38:c5:ed:5c:45:9a:bf:66:
        4a:f1:49:7a:de:44:1b:56:bc:71:28:1a:8b:53:30:23
    Fingerprint (MD5):
        DF:6A:84:9F:F9:4B:03:A3:AE:92:C2:85:CF:B0:86:DE
    Fingerprint (SHA1):
        D3:1C:D2:53:84:45:92:70:AA:5B:EC:53:1B:A0:3E:2E:53:F0:92:DE

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #2348: CRLDP: Verifying certificate(s)  EE11CA1.der CA1CA0.der with flags   -g chain -h requireFreshInfo -m crl -d AllDB -f    -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE21CA2.der CA2CA0.der with flags   -g chain -h requireFreshInfo -m crl -d AllDB -f    -t Root.der
vfychain -d AllDB -pp -vv   -g chain -h requireFreshInfo -m crl -f    EE21CA2.der CA2CA0.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #2349: CRLDP: Verifying certificate(s)  EE21CA2.der CA2CA0.der with flags   -g chain -h requireFreshInfo -m crl -d AllDB -f    -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA0.der with flags   -g leaf -h requireFreshInfo -m crl -d AllDB -f    -t Root.der
vfychain -d AllDB -pp -vv   -g leaf -h requireFreshInfo -m crl -f    EE1CA0.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225675 (0x2422450b)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Mon Jun 06 22:59:37 2016
            Not After : Sun Jun 06 22:59:37 2066
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    9b:2a:70:23:8e:4b:86:13:1e:07:5a:69:8d:cc:cf:56:
                    14:5a:90:75:5e:37:7c:c5:0f:56:a2:76:5b:3e:33:46:
                    95:44:d0:ee:b6:d6:15:93:ce:e4:4d:c5:3b:c2:1d:30:
                    8f:bb:8b:00:f3:b9:ed:19:29:28:e0:1e:de:e7:ab:1f:
                    e7:22:04:57:a0:11:a5:8a:43:2a:22:68:10:59:b5:fe:
                    95:04:06:01:b3:6b:2d:62:ec:cd:3f:7a:6b:1e:a9:89:
                    f0:8b:37:f8:b9:b3:94:32:45:1f:dd:50:d4:05:b8:0f:
                    51:98:90:89:6c:7c:4b:f7:32:31:b0:37:ac:71:72:2d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        4f:05:f8:fe:65:7c:ff:a7:30:31:d5:79:a8:22:5a:e0:
        da:8f:5b:46:2e:0b:d2:3b:87:67:68:68:26:e9:7b:db:
        76:9c:87:9e:57:42:b9:ac:70:bf:d4:00:75:b6:c8:60:
        92:c6:34:cd:01:b8:f1:67:55:f0:b8:53:b6:fc:cc:03:
        a9:90:f3:71:7e:d6:bb:9e:5e:3c:cc:23:6f:b6:c4:0d:
        e9:ad:7d:d2:d8:c6:da:a9:8f:5d:1b:96:aa:9b:08:1a:
        9a:63:4a:c1:96:2a:48:c1:38:c5:ed:5c:45:9a:bf:66:
        4a:f1:49:7a:de:44:1b:56:bc:71:28:1a:8b:53:30:23
    Fingerprint (MD5):
        DF:6A:84:9F:F9:4B:03:A3:AE:92:C2:85:CF:B0:86:DE
    Fingerprint (SHA1):
        D3:1C:D2:53:84:45:92:70:AA:5B:EC:53:1B:A0:3E:2E:53:F0:92:DE

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #2350: CRLDP: Verifying certificate(s)  EE1CA0.der with flags   -g leaf -h requireFreshInfo -m crl -d AllDB -f    -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA0.der with flags   -g leaf -h requireFreshInfo -m crl -d AllDB -f    -t Root.der
vfychain -d AllDB -pp -vv   -g leaf -h requireFreshInfo -m crl -f    EE2CA0.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #2351: CRLDP: Verifying certificate(s)  EE2CA0.der with flags   -g leaf -h requireFreshInfo -m crl -d AllDB -f    -t Root.der - PASSED
chains.sh: Creating DB RootCADB
certutil -N -d RootCADB -f RootCADB/dbpasswd
chains.sh: #2352: TrustAnchors: Creating DB RootCADB  - PASSED
chains.sh: Creating Root CA RootCA
certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA  -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -m 606225679 < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #2353: TrustAnchors: Creating Root CA RootCA  - PASSED
chains.sh: Exporting Root CA RootCA.der
certutil -L -d RootCADB -r -n RootCA -o RootCA.der
chains.sh: #2354: TrustAnchors: Exporting Root CA RootCA.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #2355: TrustAnchors: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #2356: TrustAnchors: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 606225680   < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #2357: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA1RootCA.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der
chains.sh: #2358: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #2359: TrustAnchors: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #2360: TrustAnchors: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 606225681   < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #2361: TrustAnchors: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #2362: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #2363: TrustAnchors: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o EE1Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #2364: TrustAnchors: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 606225682   < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #2365: TrustAnchors: Creating certficate EE1CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE1CA2.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der
chains.sh: #2366: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database  - PASSED
chains.sh: Creating DB OtherRootDB
certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd
chains.sh: #2367: TrustAnchors: Creating DB OtherRootDB  - PASSED
chains.sh: Creating Root CA OtherRoot
certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot  -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -m 606225683 < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #2368: TrustAnchors: Creating Root CA OtherRoot  - PASSED
chains.sh: Exporting Root CA OtherRoot.der
certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der
chains.sh: #2369: TrustAnchors: Exporting Root CA OtherRoot.der  - PASSED
chains.sh: Creating DB OtherIntermediateDB
certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd
chains.sh: #2370: TrustAnchors: Creating DB OtherIntermediateDB  - PASSED
chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der
certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US"  -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o OtherIntermediateReq.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #2371: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der  - PASSED
chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot
certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 606225684   < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #2372: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot  - PASSED
chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database
certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der
chains.sh: #2373: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #2374: TrustAnchors: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/tests_noise -o EE2Req.der  < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #2375: TrustAnchors: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate
certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 606225685   < /<<PKGBUILDDIR>>/mozilla/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #2376: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate  - PASSED
chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der
chains.sh: #2377: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database  - PASSED
chains.sh: Creating DB DBOnlyDB
certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd
chains.sh: #2378: TrustAnchors: Creating DB DBOnlyDB  - PASSED
chains.sh: Importing certificate RootCA.der to DBOnlyDB database
certutil -A -n RootCA  -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der
chains.sh: #2379: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database  - PASSED
chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database
certutil -A -n CA1  -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der
chains.sh: #2380: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags   -d DBOnlyDB    
vfychain -d DBOnlyDB -pp -vv       EE1CA2.der CA2CA1.der 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225679 (0x2422450f)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Mon Jun 06 22:59:53 2016
            Not After : Sun Jun 06 22:59:53 2066
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:72:ba:34:ae:61:3d:2e:04:64:e9:fa:20:d0:3a:aa:
                    59:28:18:b5:a3:2c:25:7b:ad:0c:fd:56:8e:68:bc:f8:
                    45:61:2e:d7:82:2a:e8:ac:77:8c:52:18:c5:6c:15:d5:
                    c0:c1:02:c4:0e:79:51:e1:e4:af:16:54:65:1e:e1:17:
                    a3:c2:3d:4d:2a:db:6f:b6:93:b8:32:11:9e:17:af:aa:
                    98:27:16:4b:ab:eb:d0:29:09:8f:24:b4:eb:92:a5:b3:
                    8e:b1:af:fb:b7:20:44:61:bb:bf:2b:8e:63:3e:af:3d:
                    f3:49:ca:de:b4:03:e1:f8:85:8f:bc:70:27:62:a7:45
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        4f:b3:cf:1c:1d:c6:77:b9:93:74:1f:68:06:e6:64:4a:
        7b:21:eb:81:1c:a1:d7:e2:0e:56:b1:71:c9:cb:5f:b9:
        a9:d2:85:53:85:3a:0d:4b:4b:04:52:e2:89:11:f8:3b:
        97:53:1b:94:46:bf:a1:cf:0a:f0:0f:a9:7a:a2:e5:0c:
        e0:d3:a3:5d:48:3a:48:76:f1:e7:58:03:60:1b:6b:a7:
        ef:bd:95:d5:25:36:4a:f8:1c:cb:61:96:74:0b:e6:ad:
        99:a0:65:6e:ea:dc:4a:a6:f6:1d:78:b5:18:9a:e9:8a:
        77:5e:54:2e:42:b3:fd:9a:e7:e2:74:5f:0b:7a:25:56
    Fingerprint (MD5):
        12:51:09:80:BA:25:7E:42:9A:FB:11:B0:B3:9F:19:AA
    Fingerprint (SHA1):
        3A:E7:0A:65:02:AF:ED:94:9C:1A:3A:A9:47:86:21:9B:D7:22:9E:FB

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #2381: TrustAnchors: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags   -d DBOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  EE1CA2.der with flags   -d DBOnlyDB     -t CA2CA1.der
vfychain -d DBOnlyDB -pp -vv       EE1CA2.der  -t CA2CA1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225681 (0x24224511)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Mon Jun 06 22:59:55 2016
            Not After : Sun Jun 06 22:59:55 2021
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ca:b0:5f:42:1c:37:80:31:8a:8e:66:46:e1:c6:5e:8b:
                    78:e5:c1:46:b2:c9:08:50:58:fb:8f:0b:c2:7c:1f:ea:
                    40:cd:30:cc:0d:61:ca:0a:99:d8:c0:a1:9a:db:2a:f0:
                    82:4c:2c:a3:51:e2:4b:d0:d2:0e:0e:1d:82:df:87:4e:
                    89:7b:37:33:46:23:dc:83:40:21:1b:b1:93:9f:c9:e1:
                    c8:66:be:88:dd:87:ef:f2:dd:7f:8f:7c:e2:12:65:fc:
                    36:2b:f8:2e:76:4d:da:b4:ca:13:07:e8:b7:54:40:4c:
                    4f:5f:b1:76:eb:e3:d9:05:c4:2f:ca:09:a0:1f:bd:3d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7a:25:d2:75:70:e9:d3:e9:48:f7:a5:1b:e1:bc:82:11:
        ee:73:c1:16:f6:00:50:06:c5:05:7f:af:33:1c:1d:15:
        f0:b7:ca:4d:0d:12:99:8e:63:32:21:24:a1:30:d3:63:
        b8:61:5f:fe:a9:f6:05:ef:0c:41:a9:fb:dd:19:57:47:
        6c:4a:36:76:db:c1:0d:39:bf:6e:df:45:0b:11:4b:cb:
        dd:7a:d0:d4:eb:5e:67:34:0c:4a:bd:3b:8b:06:c2:e8:
        83:a3:dd:c6:dd:11:f8:a5:09:88:a7:23:c8:34:6b:c5:
        d6:36:92:d4:b4:fc:f6:5b:8d:e7:6c:fa:1c:36:6b:2e
    Fingerprint (MD5):
        83:01:53:EA:3A:5B:31:9D:FE:D7:3C:DA:C9:00:C9:7B
    Fingerprint (SHA1):
        92:50:50:15:6C:85:DD:3C:1D:0D:24:74:5B:E3:89:EB:C9:18:52:2A


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Returned value is 0, expected result is pass
chains.sh: #2382: TrustAnchors: Verifying certificate(s)  EE1CA2.der with flags   -d DBOnlyDB     -t CA2CA1.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags   -d DBOnlyDB     -t RootCA
vfychain -d DBOnlyDB -pp -vv       EE1CA2.der CA2CA1.der  -t RootCA
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225679 (0x2422450f)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Mon Jun 06 22:59:53 2016
            Not After : Sun Jun 06 22:59:53 2066
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:72:ba:34:ae:61:3d:2e:04:64:e9:fa:20:d0:3a:aa:
                    59:28:18:b5:a3:2c:25:7b:ad:0c:fd:56:8e:68:bc:f8:
                    45:61:2e:d7:82:2a:e8:ac:77:8c:52:18:c5:6c:15:d5:
                    c0:c1:02:c4:0e:79:51:e1:e4:af:16:54:65:1e:e1:17:
                    a3:c2:3d:4d:2a:db:6f:b6:93:b8:32:11:9e:17:af:aa:
                    98:27:16:4b:ab:eb:d0:29:09:8f:24:b4:eb:92:a5:b3:
                    8e:b1:af:fb:b7:20:44:61:bb:bf:2b:8e:63:3e:af:3d:
                    f3:49:ca:de:b4:03:e1:f8:85:8f:bc:70:27:62:a7:45
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        4f:b3:cf:1c:1d:c6:77:b9:93:74:1f:68:06:e6:64:4a:
        7b:21:eb:81:1c:a1:d7:e2:0e:56:b1:71:c9:cb:5f:b9:
        a9:d2:85:53:85:3a:0d:4b:4b:04:52:e2:89:11:f8:3b:
        97:53:1b:94:46:bf:a1:cf:0a:f0:0f:a9:7a:a2:e5:0c:
        e0:d3:a3:5d:48:3a:48:76:f1:e7:58:03:60:1b:6b:a7:
        ef:bd:95:d5:25:36:4a:f8:1c:cb:61:96:74:0b:e6:ad:
        99:a0:65:6e:ea:dc:4a:a6:f6:1d:78:b5:18:9a:e9:8a:
        77:5e:54:2e:42:b3:fd:9a:e7:e2:74:5f:0b:7a:25:56
    Fingerprint (MD5):
        12:51:09:80:BA:25:7E:42:9A:FB:11:B0:B3:9F:19:AA
    Fingerprint (SHA1):
        3A:E7:0A:65:02:AF:ED:94:9C:1A:3A:A9:47:86:21:9B:D7:22:9E:FB

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #2383: TrustAnchors: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags   -d DBOnlyDB     -t RootCA - PASSED
chains.sh: Creating DB TrustOnlyDB
certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd
chains.sh: #2384: TrustAnchors: Creating DB TrustOnlyDB  - PASSED
chains.sh: Verifying certificate(s)  EE1CA2.der CA2CA1.der CA1RootCA.der with flags   -d TrustOnlyDB     -t RootCA.der
vfychain -d TrustOnlyDB -pp -vv       EE1CA2.der CA2CA1.der CA1RootCA.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225679 (0x2422450f)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Mon Jun 06 22:59:53 2016
            Not After : Sun Jun 06 22:59:53 2066
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:72:ba:34:ae:61:3d:2e:04:64:e9:fa:20:d0:3a:aa:
                    59:28:18:b5:a3:2c:25:7b:ad:0c:fd:56:8e:68:bc:f8:
                    45:61:2e:d7:82:2a:e8:ac:77:8c:52:18:c5:6c:15:d5:
                    c0:c1:02:c4:0e:79:51:e1:e4:af:16:54:65:1e:e1:17:
                    a3:c2:3d:4d:2a:db:6f:b6:93:b8:32:11:9e:17:af:aa:
                    98:27:16:4b:ab:eb:d0:29:09:8f:24:b4:eb:92:a5:b3:
                    8e:b1:af:fb:b7:20:44:61:bb:bf:2b:8e:63:3e:af:3d:
                    f3:49:ca:de:b4:03:e1:f8:85:8f:bc:70:27:62:a7:45
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        4f:b3:cf:1c:1d:c6:77:b9:93:74:1f:68:06:e6:64:4a:
        7b:21:eb:81:1c:a1:d7:e2:0e:56:b1:71:c9:cb:5f:b9:
        a9:d2:85:53:85:3a:0d:4b:4b:04:52:e2:89:11:f8:3b:
        97:53:1b:94:46:bf:a1:cf:0a:f0:0f:a9:7a:a2:e5:0c:
        e0:d3:a3:5d:48:3a:48:76:f1:e7:58:03:60:1b:6b:a7:
        ef:bd:95:d5:25:36:4a:f8:1c:cb:61:96:74:0b:e6:ad:
        99:a0:65:6e:ea:dc:4a:a6:f6:1d:78:b5:18:9a:e9:8a:
        77:5e:54:2e:42:b3:fd:9a:e7:e2:74:5f:0b:7a:25:56
    Fingerprint (MD5):
        12:51:09:80:BA:25:7E:42:9A:FB:11:B0:B3:9F:19:AA
    Fingerprint (SHA1):
        3A:E7:0A:65:02:AF:ED:94:9C:1A:3A:A9:47:86:21:9B:D7:22:9E:FB


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #2385: TrustAnchors: Verifying certificate(s)  EE1CA2.der CA2CA1.der CA1RootCA.der with flags   -d TrustOnlyDB     -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA2.der with flags   -d TrustOnlyDB     -t CA2CA1.der
vfychain -d TrustOnlyDB -pp -vv       EE1CA2.der  -t CA2CA1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225681 (0x24224511)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Mon Jun 06 22:59:55 2016
            Not After : Sun Jun 06 22:59:55 2021
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ca:b0:5f:42:1c:37:80:31:8a:8e:66:46:e1:c6:5e:8b:
                    78:e5:c1:46:b2:c9:08:50:58:fb:8f:0b:c2:7c:1f:ea:
                    40:cd:30:cc:0d:61:ca:0a:99:d8:c0:a1:9a:db:2a:f0:
                    82:4c:2c:a3:51:e2:4b:d0:d2:0e:0e:1d:82:df:87:4e:
                    89:7b:37:33:46:23:dc:83:40:21:1b:b1:93:9f:c9:e1:
                    c8:66:be:88:dd:87:ef:f2:dd:7f:8f:7c:e2:12:65:fc:
                    36:2b:f8:2e:76:4d:da:b4:ca:13:07:e8:b7:54:40:4c:
                    4f:5f:b1:76:eb:e3:d9:05:c4:2f:ca:09:a0:1f:bd:3d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7a:25:d2:75:70:e9:d3:e9:48:f7:a5:1b:e1:bc:82:11:
        ee:73:c1:16:f6:00:50:06:c5:05:7f:af:33:1c:1d:15:
        f0:b7:ca:4d:0d:12:99:8e:63:32:21:24:a1:30:d3:63:
        b8:61:5f:fe:a9:f6:05:ef:0c:41:a9:fb:dd:19:57:47:
        6c:4a:36:76:db:c1:0d:39:bf:6e:df:45:0b:11:4b:cb:
        dd:7a:d0:d4:eb:5e:67:34:0c:4a:bd:3b:8b:06:c2:e8:
        83:a3:dd:c6:dd:11:f8:a5:09:88:a7:23:c8:34:6b:c5:
        d6:36:92:d4:b4:fc:f6:5b:8d:e7:6c:fa:1c:36:6b:2e
    Fingerprint (MD5):
        83:01:53:EA:3A:5B:31:9D:FE:D7:3C:DA:C9:00:C9:7B
    Fingerprint (SHA1):
        92:50:50:15:6C:85:DD:3C:1D:0D:24:74:5B:E3:89:EB:C9:18:52:2A


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Returned value is 0, expected result is pass
chains.sh: #2386: TrustAnchors: Verifying certificate(s)  EE1CA2.der with flags   -d TrustOnlyDB     -t CA2CA1.der - PASSED
chains.sh: Creating DB TrustAndDBDB
certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd
chains.sh: #2387: TrustAnchors: Creating DB TrustAndDBDB  - PASSED
chains.sh: Importing certificate RootCA.der to TrustAndDBDB database
certutil -A -n RootCA  -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der
chains.sh: #2388: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database  - PASSED
chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database
certutil -A -n CA1  -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der
chains.sh: #2389: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags   -d TrustAndDBDB    
vfychain -d TrustAndDBDB -pp -vv       EE1CA2.der CA2CA1.der 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225679 (0x2422450f)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Mon Jun 06 22:59:53 2016
            Not After : Sun Jun 06 22:59:53 2066
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:72:ba:34:ae:61:3d:2e:04:64:e9:fa:20:d0:3a:aa:
                    59:28:18:b5:a3:2c:25:7b:ad:0c:fd:56:8e:68:bc:f8:
                    45:61:2e:d7:82:2a:e8:ac:77:8c:52:18:c5:6c:15:d5:
                    c0:c1:02:c4:0e:79:51:e1:e4:af:16:54:65:1e:e1:17:
                    a3:c2:3d:4d:2a:db:6f:b6:93:b8:32:11:9e:17:af:aa:
                    98:27:16:4b:ab:eb:d0:29:09:8f:24:b4:eb:92:a5:b3:
                    8e:b1:af:fb:b7:20:44:61:bb:bf:2b:8e:63:3e:af:3d:
                    f3:49:ca:de:b4:03:e1:f8:85:8f:bc:70:27:62:a7:45
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        4f:b3:cf:1c:1d:c6:77:b9:93:74:1f:68:06:e6:64:4a:
        7b:21:eb:81:1c:a1:d7:e2:0e:56:b1:71:c9:cb:5f:b9:
        a9:d2:85:53:85:3a:0d:4b:4b:04:52:e2:89:11:f8:3b:
        97:53:1b:94:46:bf:a1:cf:0a:f0:0f:a9:7a:a2:e5:0c:
        e0:d3:a3:5d:48:3a:48:76:f1:e7:58:03:60:1b:6b:a7:
        ef:bd:95:d5:25:36:4a:f8:1c:cb:61:96:74:0b:e6:ad:
        99:a0:65:6e:ea:dc:4a:a6:f6:1d:78:b5:18:9a:e9:8a:
        77:5e:54:2e:42:b3:fd:9a:e7:e2:74:5f:0b:7a:25:56
    Fingerprint (MD5):
        12:51:09:80:BA:25:7E:42:9A:FB:11:B0:B3:9F:19:AA
    Fingerprint (SHA1):
        3A:E7:0A:65:02:AF:ED:94:9C:1A:3A:A9:47:86:21:9B:D7:22:9E:FB

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #2390: TrustAnchors: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags   -d TrustAndDBDB     - PASSED
chains.sh: Verifying certificate(s)  EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags   -d TrustAndDBDB     -t OtherRoot.der
vfychain -d TrustAndDBDB -pp -vv       EE2OtherIntermediate.der OtherIntermediateOtherRoot.der  -t OtherRoot.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225683 (0x24224513)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US"
        Validity:
            Not Before: Mon Jun 06 22:59:58 2016
            Not After : Sun Jun 06 22:59:58 2066
        Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c1:a8:7a:95:75:6f:cb:2e:a4:4b:69:33:1e:c4:b9:75:
                    3d:bb:ab:a4:e7:86:eb:af:40:5f:f2:5d:51:55:87:41:
                    70:ea:f8:ff:e6:c7:d7:13:26:03:17:dc:4c:61:b6:be:
                    cb:bd:76:8d:0c:fb:4a:d8:e0:66:0d:af:6d:1f:8a:f7:
                    77:6e:79:04:7a:37:60:6f:52:c5:70:f8:b2:63:40:9f:
                    49:6d:b1:8e:89:bf:02:63:5e:57:d1:c8:8b:53:cc:d4:
                    fc:90:b0:8e:a7:99:9f:a4:6d:b9:0a:0d:89:62:ef:14:
                    7b:fc:a6:f4:69:66:6c:04:13:4d:7b:4f:94:3f:1e:c7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        68:87:52:96:0a:e5:e6:fa:3c:55:9d:4d:36:33:5f:9c:
        c2:a3:01:ea:92:ca:71:46:82:8f:c3:d6:70:7f:aa:76:
        66:f8:fc:bf:31:d6:ed:b0:d2:58:b4:a1:c5:a0:60:c2:
        d0:0f:4b:9b:2e:62:7b:49:43:b6:af:10:8b:bb:53:97:
        b3:41:8b:6c:f1:0f:93:4d:a1:78:b4:57:b6:80:76:ca:
        61:ff:17:d6:b0:ea:b7:89:eb:18:b6:f6:01:a9:e5:8a:
        38:61:09:ed:5c:3d:0b:70:3a:f8:58:87:fc:31:fc:12:
        ca:1e:8b:b8:bf:bc:dc:48:b2:11:75:a6:90:87:64:2f
    Fingerprint (MD5):
        7B:F2:69:87:9A:CB:F2:D5:18:8B:D7:E7:2C:D7:0F:B2
    Fingerprint (SHA1):
        3E:39:06:E5:70:D3:4D:9D:1D:1B:4A:E9:53:4E:9C:79:4F:C4:F3:08


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate
    ,C=US"
Returned value is 0, expected result is pass
chains.sh: #2391: TrustAnchors: Verifying certificate(s)  EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags   -d TrustAndDBDB     -t OtherRoot.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags -T  -d TrustAndDBDB     -t OtherIntermediateOtherRoot.der -t OtherRoot.der
vfychain -d TrustAndDBDB -pp -vv -T      EE1CA2.der CA2CA1.der  -t OtherIntermediateOtherRoot.der -t OtherRoot.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 606225679 (0x2422450f)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Mon Jun 06 22:59:53 2016
            Not After : Sun Jun 06 22:59:53 2066
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:72:ba:34:ae:61:3d:2e:04:64:e9:fa:20:d0:3a:aa:
                    59:28:18:b5:a3:2c:25:7b:ad:0c:fd:56:8e:68:bc:f8:
                    45:61:2e:d7:82:2a:e8:ac:77:8c:52:18:c5:6c:15:d5:
                    c0:c1:02:c4:0e:79:51:e1:e4:af:16:54:65:1e:e1:17:
                    a3:c2:3d:4d:2a:db:6f:b6:93:b8:32:11:9e:17:af:aa:
                    98:27:16:4b:ab:eb:d0:29:09:8f:24:b4:eb:92:a5:b3:
                    8e:b1:af:fb:b7:20:44:61:bb:bf:2b:8e:63:3e:af:3d:
                    f3:49:ca:de:b4:03:e1:f8:85:8f:bc:70:27:62:a7:45
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        4f:b3:cf:1c:1d:c6:77:b9:93:74:1f:68:06:e6:64:4a:
        7b:21:eb:81:1c:a1:d7:e2:0e:56:b1:71:c9:cb:5f:b9:
        a9:d2:85:53:85:3a:0d:4b:4b:04:52:e2:89:11:f8:3b:
        97:53:1b:94:46:bf:a1:cf:0a:f0:0f:a9:7a:a2:e5:0c:
        e0:d3:a3:5d:48:3a:48:76:f1:e7:58:03:60:1b:6b:a7:
        ef:bd:95:d5:25:36:4a:f8:1c:cb:61:96:74:0b:e6:ad:
        99:a0:65:6e:ea:dc:4a:a6:f6:1d:78:b5:18:9a:e9:8a:
        77:5e:54:2e:42:b3:fd:9a:e7:e2:74:5f:0b:7a:25:56
    Fingerprint (MD5):
        12:51:09:80:BA:25:7E:42:9A:FB:11:B0:B3:9F:19:AA
    Fingerprint (SHA1):
        3A:E7:0A:65:02:AF:ED:94:9C:1A:3A:A9:47:86:21:9B:D7:22:9E:FB

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #2392: TrustAnchors: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags -T  -d TrustAndDBDB     -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED
chains.sh: Creating DB ExplicitDistrustDB
certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd
chains.sh: #2393: TrustAnchors: Creating DB ExplicitDistrustDB  - PASSED
chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database
certutil -A -n RootCA  -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der
chains.sh: #2394: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database  - PASSED
chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database
certutil -A -n CA1  -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der
chains.sh: #2395: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database  - PASSED
chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database
certutil -A -n OtherRoot  -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der
chains.sh: #2396: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags   -d ExplicitDistrustDB     -t CA1RootCA.der
vfychain -d ExplicitDistrustDB -pp -vv       EE1CA2.der CA2CA1.der  -t CA1RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8171: Peer's certificate has been marked as not trusted by the user.
Returned value is 1, expected result is fail
chains.sh: #2397: TrustAnchors: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags   -d ExplicitDistrustDB     -t CA1RootCA.der - PASSED
trying to kill httpserv with PID 6986 at Mon Jun  6 23:00:07 UTC 2016
kill -USR1 6986
selfserv: normal termination
httpserv -b -p 8641 2>/dev/null;
httpserv with PID 6986 killed at Mon Jun  6 23:00:07 UTC 2016
TIMESTAMP chains END: Mon Jun  6 23:00:07 UTC 2016

SUMMARY:
========
NSS variables:
--------------
HOST=testbuildd
DOMSUF=(none)
BUILD_OPT=
USE_64=
NSS_CYCLES="standard"
NSS_TESTS=""
NSS_SSL_TESTS="crl bypass_normal normal_bypass fips_normal normal_fips iopr"
NSS_SSL_RUN="cov auth stress"
NSS_AIA_PATH=
NSS_AIA_HTTP=
NSS_AIA_OCSP=
IOPR_HOSTADDR_LIST=
PKITS_DATA=

Tests summary:
--------------
Passed:             2352
Failed:             45
Failed with core:   0
Unknown status:     0

# Cleanup
rm -f dist/lib/*.chk
make[1]: Leaving directory `/<<PKGBUILDDIR>>'
 fakeroot debian/rules binary-arch
dh binary-arch
   dh_testroot -a
   dh_prep -a
   dh_installdirs -a
   debian/rules override_dh_auto_install
make[1]: Entering directory `/<<PKGBUILDDIR>>'
sed 's,/@DEB_HOST_MULTIARCH@,/arm-linux-gnueabihf,g;' debian/libnss3-1d.links.in > debian/libnss3-1d.links
sed 's,/@DEB_HOST_MULTIARCH@,/arm-linux-gnueabihf,g;' debian/libnss3-dev.links.in > debian/libnss3-dev.links
sed 's,/@DEB_HOST_MULTIARCH@,/arm-linux-gnueabihf,g;s,/@DEB_HOST_MULTIARCH_WC@,/*,g' debian/libnss3.lintian-overrides.in > debian/libnss3.lintian-overrides
sed 's,/@DEB_HOST_MULTIARCH@,/arm-linux-gnueabihf,g;s/@MOD_MAJOR_VERSION@/3/;s/@MOD_MINOR_VERSION@/14/;s/@MOD_PATCH_VERSION@/5/' debian/nss-config.in > debian/nss-config
sed 's,/@DEB_HOST_MULTIARCH@,/arm-linux-gnueabihf,g;s/@VERSION@/3.14.5/' debian/nss.pc.in > debian/nss.pc
install -m 755 -d debian/libnss3/usr/lib/arm-linux-gnueabihf/nss debian/libnss3-dev/usr/lib/arm-linux-gnueabihf/pkgconfig
install -m 644 -t debian/libnss3/usr/lib/arm-linux-gnueabihf \
		/<<PKGBUILDDIR>>/mozilla/dist/lib/libnss3.so \
		/<<PKGBUILDDIR>>/mozilla/dist/lib/libnssutil3.so \
		/<<PKGBUILDDIR>>/mozilla/dist/lib/libsmime3.so \
		/<<PKGBUILDDIR>>/mozilla/dist/lib/libssl3.so
install -m 644 -t debian/libnss3/usr/lib/arm-linux-gnueabihf/nss \
		/<<PKGBUILDDIR>>/mozilla/dist/lib/libfreebl3.so \
		/<<PKGBUILDDIR>>/mozilla/dist/lib/libsoftokn3.so \
		/<<PKGBUILDDIR>>/mozilla/dist/lib/libnssdbm3.so \
		/<<PKGBUILDDIR>>/mozilla/dist/lib/libnssckbi.so
install -m 644 -t debian/libnss3-dev/usr/include/nss \
		/<<PKGBUILDDIR>>/mozilla/dist/public/nss/*
install -m 644 -t debian/libnss3-dev/usr/lib/arm-linux-gnueabihf \
		/<<PKGBUILDDIR>>/mozilla/dist/lib/libcrmf.a
install -m 644 -t debian/libnss3-dev/usr/lib/arm-linux-gnueabihf/pkgconfig debian/nss.pc
install -m 755 -t debian/libnss3-dev/usr/bin debian/nss-config
install -m 755 -t debian/libnss3-tools/usr/bin \
		 /<<PKGBUILDDIR>>/mozilla/dist/bin/certutil  /<<PKGBUILDDIR>>/mozilla/dist/bin/cmsutil  /<<PKGBUILDDIR>>/mozilla/dist/bin/crlutil  /<<PKGBUILDDIR>>/mozilla/dist/bin/modutil  /<<PKGBUILDDIR>>/mozilla/dist/bin/pk12util  /<<PKGBUILDDIR>>/mozilla/dist/bin/shlibsign  /<<PKGBUILDDIR>>/mozilla/dist/bin/signtool  /<<PKGBUILDDIR>>/mozilla/dist/bin/signver  /<<PKGBUILDDIR>>/mozilla/dist/bin/ssltap  /<<PKGBUILDDIR>>/mozilla/dist/bin/pwdecrypt
make[1]: Leaving directory `/<<PKGBUILDDIR>>'
   dh_install -a
   dh_installdocs -a
   dh_installchangelogs -a
   dh_installexamples -a
   dh_installman -a
   dh_installcatalogs -a
   dh_installcron -a
   dh_installdebconf -a
   dh_installemacsen -a
   dh_installifupdown -a
   dh_installinfo -a
   dh_installinit -a
   dh_installmenu -a
   dh_installmime -a
   dh_installmodules -a
   dh_installlogcheck -a
   dh_installlogrotate -a
   dh_installpam -a
   dh_installppp -a
   dh_installudev -a
   dh_installwm -a
   dh_installxfonts -a
   dh_installgsettings -a
   dh_bugfiles -a
   dh_ucf -a
   dh_lintian -a
   dh_gconf -a
   dh_icons -a
   dh_perl -a
   dh_usrlocal -a
   dh_link -a
   dh_compress -a
   dh_fixperms -a
   debian/rules override_dh_strip
make[1]: Entering directory `/<<PKGBUILDDIR>>'
dh_strip -a --dbg-package=libnss3-dbg
LD_LIBRARY_PATH=debian/libnss3/usr/lib/arm-linux-gnueabihf:debian/libnss3/usr/lib/arm-linux-gnueabihf/nss debian/libnss3-tools/usr/bin/shlibsign -v -i debian/libnss3/usr/lib/arm-linux-gnueabihf/nss/libsoftokn3.so;  LD_LIBRARY_PATH=debian/libnss3/usr/lib/arm-linux-gnueabihf:debian/libnss3/usr/lib/arm-linux-gnueabihf/nss debian/libnss3-tools/usr/bin/shlibsign -v -i debian/libnss3/usr/lib/arm-linux-gnueabihf/nss/libfreebl3.so;  LD_LIBRARY_PATH=debian/libnss3/usr/lib/arm-linux-gnueabihf:debian/libnss3/usr/lib/arm-linux-gnueabihf/nss debian/libnss3-tools/usr/bin/shlibsign -v -i debian/libnss3/usr/lib/arm-linux-gnueabihf/nss/libnssdbm3.so;
ERROR: ld.so: object 'libfakeroot-sysv.so' from LD_PRELOAD cannot be preloaded: ignored.
Library File: debian/libnss3/usr/lib/arm-linux-gnueabihf/nss/libsoftokn3.so 207820 bytes
Check File: debian/libnss3/usr/lib/arm-linux-gnueabihf/nss/libsoftokn3.chk
  hash: 32 bytes
    31 44 ba c9 4d bf e1 cf a6 c4
    b4 34 04 f4 21 66 a6 6a c8 27
    5e aa 44 70 f7 8a e6 8a c6 09
    84 e6
  signature: 64 bytes
    67 c7 93 9b 49 df 00 03 d6 d3
    f8 cb a7 f8 d1 22 6e 3b c5 75
    a4 28 e1 52 ad 7b a9 57 13 16
    72 40 25 bc 36 27 f1 53 0c 09
    30 50 db d0 39 9e ff 62 90 97
    a1 77 96 56 b8 77 09 d4 25 97
    ec f5 07 82
moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB
Generate a DSA key pair ... 
ERROR: ld.so: object 'libfakeroot-sysv.so' from LD_PRELOAD cannot be preloaded: ignored.
Library File: debian/libnss3/usr/lib/arm-linux-gnueabihf/nss/libfreebl3.so 313320 bytes
Check File: debian/libnss3/usr/lib/arm-linux-gnueabihf/nss/libfreebl3.chk
  hash: 32 bytes
    9c 6e da f5 8c ce 07 90 c3 5e
    e6 d5 3d de 88 3b 0a 3e 5b 2b
    55 92 e7 dd 98 88 39 d5 bc de
    91 21
  signature: 64 bytes
    6b 02 43 1b 03 62 08 b0 5b 86
    55 4b 6d ba 7a d1 2a 07 16 ca
    2b 6a 6b 9b 97 f7 7c de 4c 25
    5b 09 83 42 d6 4d 38 d6 78 85
    6f 11 c3 9b 51 01 36 9d 56 7e
    60 d2 1e 52 3f 02 71 f4 69 3e
    c4 2c b4 3a
moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB
Generate a DSA key pair ... 
ERROR: ld.so: object 'libfakeroot-sysv.so' from LD_PRELOAD cannot be preloaded: ignored.
Library File: debian/libnss3/usr/lib/arm-linux-gnueabihf/nss/libnssdbm3.so 120948 bytes
Check File: debian/libnss3/usr/lib/arm-linux-gnueabihf/nss/libnssdbm3.chk
  hash: 32 bytes
    10 16 4c d4 04 a9 2c 8b 52 7f
    e1 f8 ae 03 0c f7 ff 4e 4b 5f
    3d 10 16 93 e3 95 67 05 2f 42
    1c 36
  signature: 64 bytes
    1e a4 9f f3 a4 72 cf b4 db 1c
    74 2a b4 1a f7 9b 4d 77 37 b0
    e4 7f ea 55 aa 25 14 e5 72 c8
    d4 92 1f 38 78 1e 99 f8 b0 e1
    cf a3 43 fa cb db f0 51 c1 89
    06 90 ad 19 ac 3b 11 c4 3b 57
    9e 47 e2 c5
moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB
Generate a DSA key pair ... 
# Check FIPS mode correctly works
mkdir debian/tmp
LD_LIBRARY_PATH=debian/libnss3/usr/lib/arm-linux-gnueabihf:debian/libnss3/usr/lib/arm-linux-gnueabihf/nss debian/libnss3-tools/usr/bin/modutil -create -dbdir debian/tmp < /dev/null
ERROR: ld.so: object 'libfakeroot-sysv.so' from LD_PRELOAD cannot be preloaded: ignored.

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
LD_LIBRARY_PATH=debian/libnss3/usr/lib/arm-linux-gnueabihf:debian/libnss3/usr/lib/arm-linux-gnueabihf/nss debian/libnss3-tools/usr/bin/modutil -fips true -dbdir debian/tmp < /dev/null
ERROR: ld.so: object 'libfakeroot-sysv.so' from LD_PRELOAD cannot be preloaded: ignored.

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
FIPS mode enabled.
make[1]: Leaving directory `/<<PKGBUILDDIR>>'
   debian/rules override_dh_makeshlibs
make[1]: Entering directory `/<<PKGBUILDDIR>>'
dh_makeshlibs -a -- -c4
cat /usr/share/debhelper/autoscripts/postinst-makeshlibs > debian/libnss3.postinst.debhelper
cat /usr/share/debhelper/autoscripts/postrm-makeshlibs > debian/libnss3.postrm.debhelper
make[1]: Leaving directory `/<<PKGBUILDDIR>>'
   dh_shlibdeps -a
Use of uninitialized value $dep in split at /usr/bin/dpkg-shlibdeps line 612.
Use of uninitialized value $dep in split at /usr/bin/dpkg-shlibdeps line 612.
dpkg-shlibdeps: warning: relation < is deprecated: use << or <=
dpkg-shlibdeps: warning: package could avoid a useless dependency if debian/libnss3-tools/usr/bin/cmsutil debian/libnss3-tools/usr/bin/certutil debian/libnss3-tools/usr/bin/crlutil debian/libnss3-tools/usr/bin/pwdecrypt debian/libnss3-tools/usr/bin/ssltap debian/libnss3-tools/usr/bin/shlibsign debian/libnss3-tools/usr/bin/modutil debian/libnss3-tools/usr/bin/signver debian/libnss3-tools/usr/bin/pk12util debian/libnss3-tools/usr/bin/signtool were not linked against libdl.so.2 (they use none of the library's symbols)
dpkg-shlibdeps: warning: package could avoid a useless dependency if debian/libnss3-tools/usr/bin/cmsutil debian/libnss3-tools/usr/bin/certutil debian/libnss3-tools/usr/bin/crlutil debian/libnss3-tools/usr/bin/pwdecrypt debian/libnss3-tools/usr/bin/ssltap debian/libnss3-tools/usr/bin/modutil debian/libnss3-tools/usr/bin/signver debian/libnss3-tools/usr/bin/pk12util debian/libnss3-tools/usr/bin/signtool were not linked against libssl3.so (they use none of the library's symbols)
   dh_installdeb -a
   debian/rules override_dh_gencontrol
make[1]: Entering directory `/<<PKGBUILDDIR>>'
dh_gencontrol -- -Vmisc:Multi-Arch=same
dpkg-gencontrol: warning: File::FcntlLock not available; using flock which is not NFS-safe
dpkg-gencontrol: warning: Pre-Depends field of package libnss3-1d: unknown substitution variable ${misc:Pre-Depends}
dpkg-gencontrol: warning: File::FcntlLock not available; using flock which is not NFS-safe
dpkg-gencontrol: warning: File::FcntlLock not available; using flock which is not NFS-safe
dpkg-gencontrol: warning: File::FcntlLock not available; using flock which is not NFS-safe
dpkg-gencontrol: warning: File::FcntlLock not available; using flock which is not NFS-safe
make[1]: Leaving directory `/<<PKGBUILDDIR>>'
   dh_md5sums -a
   debian/rules override_dh_builddeb
make[1]: Entering directory `/<<PKGBUILDDIR>>'
dh_builddeb -- -Zxz
dpkg-deb: building package `libnss3' in `../libnss3_3.14.5-1+deb7u7_armhf.deb'.
dpkg-deb: building package `libnss3-1d' in `../libnss3-1d_3.14.5-1+deb7u7_armhf.deb'.
dpkg-deb: building package `libnss3-tools' in `../libnss3-tools_3.14.5-1+deb7u7_armhf.deb'.
dpkg-deb: building package `libnss3-dev' in `../libnss3-dev_3.14.5-1+deb7u7_armhf.deb'.
dpkg-deb: building package `libnss3-dbg' in `../libnss3-dbg_3.14.5-1+deb7u7_armhf.deb'.
make[1]: Leaving directory `/<<PKGBUILDDIR>>'
 dpkg-genchanges -B -mRaspbian nitrogen6x test autobuilder <root@raspbian.org> >../nss_3.14.5-1+deb7u7_armhf.changes
dpkg-genchanges: arch-specific upload - not including arch-independent packages
dpkg-genchanges: binary-only upload - not including any source code
 dpkg-source --after-build nss-3.14.5
dpkg-buildpackage: binary only upload (no source included)
--------------------------------------------------------------------------------
Build finished at 20160606-2301

Finished
--------

I: Built successfully

+------------------------------------------------------------------------------+
| Post Build Chroot                                                            |
+------------------------------------------------------------------------------+


+------------------------------------------------------------------------------+
| Changes                                                                      |
+------------------------------------------------------------------------------+


nss_3.14.5-1+deb7u7_armhf.changes:
----------------------------------

Format: 1.8
Date: Fri, 03 Jun 2016 10:05:19 +0000
Source: nss
Binary: libnss3 libnss3-1d libnss3-tools libnss3-dev libnss3-dbg
Architecture: armhf
Version: 2:3.14.5-1+deb7u7
Distribution: wheezy-staging
Urgency: high
Maintainer: Raspbian nitrogen6x test autobuilder <root@raspbian.org>
Changed-By: Ola Lundqvist <opal@debian.org>
Description: 
 libnss3    - Network Security Service libraries
 libnss3-1d - Network Security Service libraries - transitional package
 libnss3-dbg - Debugging symbols for the Network Security Service libraries
 libnss3-dev - Development files for the Network Security Service libraries
 libnss3-tools - Network Security Service tools
Changes: 
 nss (2:3.14.5-1+deb7u7) wheezy-security; urgency=high
 .
   * Non-maintainer upload by the Long Term Security Team.
   * Add CVE-2015-4000.patch patch.
     CVE-2015-4000: NSS patch increasing limit to 1023 bits.
Checksums-Sha1: 
 2fa7d3325b422885861b61866a31a8c6afc34b4a 849486 libnss3_3.14.5-1+deb7u7_armhf.deb
 0fe045e69c629990445f368b9274ac714cc1f868 21328 libnss3-1d_3.14.5-1+deb7u7_armhf.deb
 8806c0fcd95c4b5ecd12694ffb7535967860cc2d 208550 libnss3-tools_3.14.5-1+deb7u7_armhf.deb
 d6f7e55ee38beab2b82514757266a991035084ed 215556 libnss3-dev_3.14.5-1+deb7u7_armhf.deb
 d44df7691c2b4abc98cdaaf54b62e3a7f92c8aae 3452192 libnss3-dbg_3.14.5-1+deb7u7_armhf.deb
Checksums-Sha256: 
 dc4d6b811d8b2cb7fccd401c1893053ab1364a5a8a4634c6443308d163709e85 849486 libnss3_3.14.5-1+deb7u7_armhf.deb
 2ac2156620c9786c9b885baf8ce5147bfc36f7a3cf40c39733c304cd20b4b4e8 21328 libnss3-1d_3.14.5-1+deb7u7_armhf.deb
 658807e6e5a2a82e0872080935d092193254995dac3a9f805a128d9716b37e1d 208550 libnss3-tools_3.14.5-1+deb7u7_armhf.deb
 d8286e10359a23754ec9c0e438c12391330c094bed8143fc936031a5e566edf7 215556 libnss3-dev_3.14.5-1+deb7u7_armhf.deb
 1ed63fedeb43723502f0eea875722031b27721add3b4b6a78d81782b0f9db128 3452192 libnss3-dbg_3.14.5-1+deb7u7_armhf.deb
Files: 
 45fa4882cc12d67671ebdd293c31bb9c 849486 libs optional libnss3_3.14.5-1+deb7u7_armhf.deb
 0777c12cdfc6243bd0291e426a98b6a5 21328 oldlibs extra libnss3-1d_3.14.5-1+deb7u7_armhf.deb
 63516dedb2b4a421d86294ee399981e0 208550 admin optional libnss3-tools_3.14.5-1+deb7u7_armhf.deb
 8fe3758aa811ef149900261f8ebf7d86 215556 libdevel optional libnss3-dev_3.14.5-1+deb7u7_armhf.deb
 f452fa378d0ac512f03b4fc1c67d7a28 3452192 debug extra libnss3-dbg_3.14.5-1+deb7u7_armhf.deb

+------------------------------------------------------------------------------+
| Package contents                                                             |
+------------------------------------------------------------------------------+


libnss3_3.14.5-1+deb7u7_armhf.deb
---------------------------------

 new debian package, version 2.0.
 size 849486 bytes: control archive=10814 bytes.
     819 bytes,    18 lines      control              
    1075 bytes,    14 lines      md5sums              
      62 bytes,     5 lines   *  postinst             #!/bin/sh
      59 bytes,     5 lines   *  postrm               #!/bin/sh
   63868 bytes,  1374 lines      symbols              
 Package: libnss3
 Source: nss
 Version: 2:3.14.5-1+deb7u7
 Architecture: armhf
 Maintainer: Maintainers of Mozilla-related packages <pkg-mozilla-maintainers@lists.alioth.debian.org>
 Installed-Size: 2580
 Pre-Depends: multiarch-support
 Depends: libc6 (>= 2.13-28), libgcc1 (>= 1:4.4.0), libnspr4 (>= 2:4.9-2~) | libnspr4-0d (>= 4.8.6), libsqlite3-0 (>= 3.5.9), zlib1g (>= 1:1.1.4)
 Conflicts: libnss3-1d (<< 2:3.13.4-2)
 Section: libs
 Priority: optional
 Multi-Arch: same
 Homepage: http://www.mozilla.org/projects/security/pki/nss/
 Description: Network Security Service libraries
  This is a set of libraries designed to support cross-platform development
  of security-enabled client and server applications. It can support SSLv2
  and  v4, TLS, PKCS #5, #7, #11, #12, S/MIME, X.509 v3 certificates and
  other security standards.

drwxr-xr-x root/root         0 2016-06-06 23:00 ./
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/lib/
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/lib/arm-linux-gnueabihf/
-rw-r--r-- root/root    994296 2016-06-06 23:00 ./usr/lib/arm-linux-gnueabihf/libnss3.so
-rw-r--r-- root/root    129224 2016-06-06 23:00 ./usr/lib/arm-linux-gnueabihf/libnssutil3.so
-rw-r--r-- root/root    130296 2016-06-06 23:00 ./usr/lib/arm-linux-gnueabihf/libsmime3.so
-rw-r--r-- root/root    208284 2016-06-06 23:00 ./usr/lib/arm-linux-gnueabihf/libssl3.so
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/lib/arm-linux-gnueabihf/nss/
-rw-rw-r-- root/root       899 2016-06-06 23:00 ./usr/lib/arm-linux-gnueabihf/nss/libfreebl3.chk
-rw-r--r-- root/root    313320 2016-06-06 23:00 ./usr/lib/arm-linux-gnueabihf/nss/libfreebl3.so
-rw-r--r-- root/root    421232 2016-06-06 23:00 ./usr/lib/arm-linux-gnueabihf/nss/libnssckbi.so
-rw-rw-r-- root/root       899 2016-06-06 23:00 ./usr/lib/arm-linux-gnueabihf/nss/libnssdbm3.chk
-rw-r--r-- root/root    120948 2016-06-06 23:00 ./usr/lib/arm-linux-gnueabihf/nss/libnssdbm3.so
-rw-rw-r-- root/root       899 2016-06-06 23:00 ./usr/lib/arm-linux-gnueabihf/nss/libsoftokn3.chk
-rw-r--r-- root/root    207820 2016-06-06 23:00 ./usr/lib/arm-linux-gnueabihf/nss/libsoftokn3.so
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/share/
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/share/doc/
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/share/doc/libnss3/
-rw-r--r-- root/root      8703 2016-06-03 10:24 ./usr/share/doc/libnss3/changelog.Debian.gz
-rw-r--r-- root/root     39470 2015-08-16 18:28 ./usr/share/doc/libnss3/copyright
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/share/lintian/
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/share/lintian/overrides/
-rw-r--r-- root/root       708 2016-06-06 23:00 ./usr/share/lintian/overrides/libnss3


libnss3-1d_3.14.5-1+deb7u7_armhf.deb
------------------------------------

 new debian package, version 2.0.
 size 21328 bytes: control archive=603 bytes.
     509 bytes,    14 lines      control              
     221 bytes,     3 lines      md5sums              
 Package: libnss3-1d
 Source: nss
 Version: 2:3.14.5-1+deb7u7
 Architecture: armhf
 Maintainer: Maintainers of Mozilla-related packages <pkg-mozilla-maintainers@lists.alioth.debian.org>
 Installed-Size: 48
 Depends: libnss3 (= 2:3.14.5-1+deb7u7)
 Section: oldlibs
 Priority: extra
 Multi-Arch: same
 Homepage: http://www.mozilla.org/projects/security/pki/nss/
 Description: Network Security Service libraries - transitional package
  This is a transitional package to ensure smooth transition of all packages
  to libnss3.

drwxr-xr-x root/root         0 2016-06-06 23:00 ./
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/lib/
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/lib/arm-linux-gnueabihf/
lrwxrwxrwx root/root         0 2016-06-06 23:00 ./usr/lib/arm-linux-gnueabihf/libnss3.so.1d -> libnss3.so
lrwxrwxrwx root/root         0 2016-06-06 23:00 ./usr/lib/arm-linux-gnueabihf/libnssutil3.so.1d -> libnssutil3.so
lrwxrwxrwx root/root         0 2016-06-06 23:00 ./usr/lib/arm-linux-gnueabihf/libsmime3.so.1d -> libsmime3.so
lrwxrwxrwx root/root         0 2016-06-06 23:00 ./usr/lib/arm-linux-gnueabihf/libssl3.so.1d -> libssl3.so
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/share/
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/share/doc/
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/share/doc/libnss3-1d/
-rw-r--r-- root/root      8703 2016-06-03 10:24 ./usr/share/doc/libnss3-1d/changelog.Debian.gz
-rw-r--r-- root/root     39470 2015-08-16 18:28 ./usr/share/doc/libnss3-1d/copyright
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/share/lintian/
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/share/lintian/overrides/
-rw-r--r-- root/root       165 2015-08-16 18:28 ./usr/share/lintian/overrides/libnss3-1d


libnss3-tools_3.14.5-1+deb7u7_armhf.deb
---------------------------------------

 new debian package, version 2.0.
 size 208550 bytes: control archive=1190 bytes.
    1126 bytes,    22 lines      control              
     736 bytes,    13 lines      md5sums              
 Package: libnss3-tools
 Source: nss
 Version: 2:3.14.5-1+deb7u7
 Architecture: armhf
 Maintainer: Maintainers of Mozilla-related packages <pkg-mozilla-maintainers@lists.alioth.debian.org>
 Installed-Size: 881
 Depends: libc6 (>= 2.13-28), libnspr4 (>= 2:4.9-2~) | libnspr4-0d (>= 4.7.0~1.9b1), libnss3 (>= 2:3.13.4-2~) | libnss3-1d (>= 3.13), zlib1g (>= 1:1.1.4)
 Section: admin
 Priority: optional
 Homepage: http://www.mozilla.org/projects/security/pki/nss/tools/
 Description: Network Security Service tools
  This is a set of tools on top of the Network Security Service libraries.
  This package includes:
   * certutil: manages certificate and key databases (cert7.db and key3.db)
   * modutil: manages the database of PKCS11 modules (secmod.db)
   * pk12util: imports/exports keys and certificates between the cert/key
     databases and files in PKCS12 format.
   * shlibsign: creates .chk files for use in FIPS mode.
   * signtool: creates digitally-signed jar archives containing files and/or
     code.
   * ssltap: proxy requests for an SSL server and display the contents of
     the messages exchanged between the client and server.

drwxr-xr-x root/root         0 2016-06-06 23:00 ./
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/bin/
-rwxr-xr-x root/root    129704 2016-06-06 23:00 ./usr/bin/certutil
-rwxr-xr-x root/root     84456 2016-06-06 23:00 ./usr/bin/cmsutil
-rwxr-xr-x root/root     92604 2016-06-06 23:00 ./usr/bin/crlutil
-rwxr-xr-x root/root    126848 2016-06-06 23:00 ./usr/bin/modutil
-rwxr-xr-x root/root     72452 2016-06-06 23:00 ./usr/bin/pk12util
-rwxr-xr-x root/root     63744 2016-06-06 23:00 ./usr/bin/pwdecrypt
-rwxr-xr-x root/root     22268 2016-06-06 23:00 ./usr/bin/shlibsign
-rwxr-xr-x root/root    150240 2016-06-06 23:00 ./usr/bin/signtool
-rwxr-xr-x root/root     72120 2016-06-06 23:00 ./usr/bin/signver
-rwxr-xr-x root/root     38640 2016-06-06 23:00 ./usr/bin/ssltap
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/share/
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/share/doc/
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/share/doc/libnss3-tools/
-rw-r--r-- root/root      8703 2016-06-03 10:24 ./usr/share/doc/libnss3-tools/changelog.Debian.gz
-rw-r--r-- root/root     39470 2015-08-16 18:28 ./usr/share/doc/libnss3-tools/copyright
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/share/lintian/
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/share/lintian/overrides/
-rw-r--r-- root/root       168 2015-08-16 18:28 ./usr/share/lintian/overrides/libnss3-tools


libnss3-dev_3.14.5-1+deb7u7_armhf.deb
-------------------------------------

 new debian package, version 2.0.
 size 215556 bytes: control archive=3348 bytes.
     801 bytes,    18 lines      control              
    6140 bytes,   102 lines      md5sums              
 Package: libnss3-dev
 Source: nss
 Version: 2:3.14.5-1+deb7u7
 Architecture: armhf
 Maintainer: Maintainers of Mozilla-related packages <pkg-mozilla-maintainers@lists.alioth.debian.org>
 Installed-Size: 1113
 Depends: libnss3 (= 2:3.14.5-1+deb7u7), libnspr4-dev (>= 4.6.6-1)
 Section: libdevel
 Priority: optional
 Homepage: http://www.mozilla.org/projects/security/pki/nss/
 Description: Development files for the Network Security Service libraries
  This is a set of libraries designed to support cross-platform development
  of security-enabled client and server applications. It can support SSLv2
  and  v4, TLS, PKCS #5, #7, #11, #12, S/MIME, X.509 v3 certificates and
  other security standards.
  .
  Install this package if you wish to develop your own programs using the
  Network Security Service Libraries.

drwxr-xr-x root/root         0 2016-06-06 23:00 ./
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/bin/
-rwxr-xr-x root/root      2364 2016-06-06 23:00 ./usr/bin/nss-config
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/include/
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/include/nss/
-rw-r--r-- root/root      1226 2016-06-06 23:00 ./usr/include/nss/base64.h
-rw-r--r-- root/root     12072 2016-06-06 23:00 ./usr/include/nss/blapit.h
-rw-r--r-- root/root     53104 2016-06-06 23:00 ./usr/include/nss/cert.h
-rw-r--r-- root/root      2511 2016-06-06 23:00 ./usr/include/nss/certdb.h
-rw-r--r-- root/root     44798 2016-06-06 23:00 ./usr/include/nss/certt.h
-rw-r--r-- root/root      2386 2016-06-06 23:00 ./usr/include/nss/ciferfam.h
-rw-r--r-- root/root     43019 2016-06-06 23:00 ./usr/include/nss/cmmf.h
-rw-r--r-- root/root      2392 2016-06-06 23:00 ./usr/include/nss/cmmft.h
-rw-r--r-- root/root     38799 2016-06-06 23:00 ./usr/include/nss/cms.h
-rw-r--r-- root/root       954 2016-06-06 23:00 ./usr/include/nss/cmsreclist.h
-rw-r--r-- root/root     17359 2016-06-06 23:00 ./usr/include/nss/cmst.h
-rw-r--r-- root/root     63980 2016-06-06 23:00 ./usr/include/nss/crmf.h
-rw-r--r-- root/root      5601 2016-06-06 23:00 ./usr/include/nss/crmft.h
-rw-r--r-- root/root     14398 2016-06-06 23:00 ./usr/include/nss/cryptohi.h
-rw-r--r-- root/root       495 2016-06-06 23:00 ./usr/include/nss/cryptoht.h
-rw-r--r-- root/root      4974 2016-06-06 23:00 ./usr/include/nss/ecl-exp.h
-rw-r--r-- root/root      1756 2016-06-06 23:00 ./usr/include/nss/hasht.h
-rw-r--r-- root/root      1636 2016-06-06 23:00 ./usr/include/nss/jar-ds.h
-rw-r--r-- root/root     10157 2016-06-06 23:00 ./usr/include/nss/jar.h
-rw-r--r-- root/root      1689 2016-06-06 23:00 ./usr/include/nss/jarfile.h
-rw-r--r-- root/root       410 2016-06-06 23:00 ./usr/include/nss/key.h
-rw-r--r-- root/root      8242 2016-06-06 23:00 ./usr/include/nss/keyhi.h
-rw-r--r-- root/root       348 2016-06-06 23:00 ./usr/include/nss/keyt.h
-rw-r--r-- root/root      7266 2016-06-06 23:00 ./usr/include/nss/keythi.h
-rw-r--r-- root/root     13272 2016-06-06 23:00 ./usr/include/nss/nss.h
-rw-r--r-- root/root      3178 2016-06-06 23:00 ./usr/include/nss/nssb64.h
-rw-r--r-- root/root       533 2016-06-06 23:00 ./usr/include/nss/nssb64t.h
-rw-r--r-- root/root      7041 2016-06-06 23:00 ./usr/include/nss/nssbase.h
-rw-r--r-- root/root      2838 2016-06-06 23:00 ./usr/include/nss/nssbaset.h
-rw-r--r-- root/root     42431 2016-06-06 23:00 ./usr/include/nss/nssck.api
-rw-r--r-- root/root      2175 2016-06-06 23:00 ./usr/include/nss/nssckbi.h
-rw-r--r-- root/root       320 2016-06-06 23:00 ./usr/include/nss/nssckepv.h
-rw-r--r-- root/root       327 2016-06-06 23:00 ./usr/include/nss/nssckft.h
-rw-r--r-- root/root      6604 2016-06-06 23:00 ./usr/include/nss/nssckfw.h
-rw-r--r-- root/root     16799 2016-06-06 23:00 ./usr/include/nss/nssckfwc.h
-rw-r--r-- root/root      2186 2016-06-06 23:00 ./usr/include/nss/nssckfwt.h
-rw-r--r-- root/root       314 2016-06-06 23:00 ./usr/include/nss/nssckg.h
-rw-r--r-- root/root     61249 2016-06-06 23:00 ./usr/include/nss/nssckmdt.h
-rw-r--r-- root/root       367 2016-06-06 23:00 ./usr/include/nss/nssckt.h
-rw-r--r-- root/root      6038 2016-06-06 23:00 ./usr/include/nss/nssilckt.h
-rw-r--r-- root/root      8280 2016-06-06 23:00 ./usr/include/nss/nssilock.h
-rw-r--r-- root/root       449 2016-06-06 23:00 ./usr/include/nss/nsslocks.h
-rw-r--r-- root/root      1172 2016-06-06 23:00 ./usr/include/nss/nsslowhash.h
-rw-r--r-- root/root      4952 2016-06-06 23:00 ./usr/include/nss/nssrwlk.h
-rw-r--r-- root/root       534 2016-06-06 23:00 ./usr/include/nss/nssrwlkt.h
-rw-r--r-- root/root       983 2016-06-06 23:00 ./usr/include/nss/nssutil.h
-rw-r--r-- root/root     27389 2016-06-06 23:00 ./usr/include/nss/ocsp.h
-rw-r--r-- root/root     12562 2016-06-06 23:00 ./usr/include/nss/ocspt.h
-rw-r--r-- root/root      6456 2016-06-06 23:00 ./usr/include/nss/p12.h
-rw-r--r-- root/root       755 2016-06-06 23:00 ./usr/include/nss/p12plcy.h
-rw-r--r-- root/root      4483 2016-06-06 23:00 ./usr/include/nss/p12t.h
-rw-r--r-- root/root       494 2016-06-06 23:00 ./usr/include/nss/pk11func.h
-rw-r--r-- root/root      6353 2016-06-06 23:00 ./usr/include/nss/pk11pqg.h
-rw-r--r-- root/root      8396 2016-06-06 23:00 ./usr/include/nss/pk11priv.h
-rw-r--r-- root/root     40513 2016-06-06 23:00 ./usr/include/nss/pk11pub.h
-rw-r--r-- root/root       731 2016-06-06 23:00 ./usr/include/nss/pk11sdr.h
-rw-r--r-- root/root      7444 2016-06-06 23:00 ./usr/include/nss/pkcs11.h
-rw-r--r-- root/root     28017 2016-06-06 23:00 ./usr/include/nss/pkcs11f.h
-rw-r--r-- root/root     18007 2016-06-06 23:00 ./usr/include/nss/pkcs11n.h
-rw-r--r-- root/root       774 2016-06-06 23:00 ./usr/include/nss/pkcs11p.h
-rw-r--r-- root/root     65933 2016-06-06 23:00 ./usr/include/nss/pkcs11t.h
-rw-r--r-- root/root       615 2016-06-06 23:00 ./usr/include/nss/pkcs11u.h
-rw-r--r-- root/root      1342 2016-06-06 23:00 ./usr/include/nss/pkcs12.h
-rw-r--r-- root/root     11236 2016-06-06 23:00 ./usr/include/nss/pkcs12t.h
-rw-r--r-- root/root      1223 2016-06-06 23:00 ./usr/include/nss/pkcs1sig.h
-rw-r--r-- root/root      8796 2016-06-06 23:00 ./usr/include/nss/pkcs7t.h
-rw-r--r-- root/root      3097 2016-06-06 23:00 ./usr/include/nss/portreg.h
-rw-r--r-- root/root      3702 2016-06-06 23:00 ./usr/include/nss/preenc.h
-rw-r--r-- root/root     11775 2016-06-06 23:00 ./usr/include/nss/secasn1.h
-rw-r--r-- root/root     10509 2016-06-06 23:00 ./usr/include/nss/secasn1t.h
-rw-r--r-- root/root      2114 2016-06-06 23:00 ./usr/include/nss/seccomon.h
-rw-r--r-- root/root      6025 2016-06-06 23:00 ./usr/include/nss/secder.h
-rw-r--r-- root/root      4001 2016-06-06 23:00 ./usr/include/nss/secdert.h
-rw-r--r-- root/root      3286 2016-06-06 23:00 ./usr/include/nss/secdig.h
-rw-r--r-- root/root       711 2016-06-06 23:00 ./usr/include/nss/secdigt.h
-rw-r--r-- root/root     11859 2016-06-06 23:00 ./usr/include/nss/secerr.h
-rw-r--r-- root/root      1691 2016-06-06 23:00 ./usr/include/nss/sechash.h
-rw-r--r-- root/root      3112 2016-06-06 23:00 ./usr/include/nss/secitem.h
-rw-r--r-- root/root      6812 2016-06-06 23:00 ./usr/include/nss/secmime.h
-rw-r--r-- root/root      6862 2016-06-06 23:00 ./usr/include/nss/secmod.h
-rw-r--r-- root/root     15803 2016-06-06 23:00 ./usr/include/nss/secmodt.h
-rw-r--r-- root/root      4760 2016-06-06 23:00 ./usr/include/nss/secoid.h
-rw-r--r-- root/root     17497 2016-06-06 23:00 ./usr/include/nss/secoidt.h
-rw-r--r-- root/root      2032 2016-06-06 23:00 ./usr/include/nss/secpkcs5.h
-rw-r--r-- root/root     22162 2016-06-06 23:00 ./usr/include/nss/secpkcs7.h
-rw-r--r-- root/root      7873 2016-06-06 23:00 ./usr/include/nss/secport.h
-rw-r--r-- root/root       512 2016-06-06 23:00 ./usr/include/nss/shsign.h
-rw-r--r-- root/root      5513 2016-06-06 23:00 ./usr/include/nss/smime.h
-rw-r--r-- root/root     42680 2016-06-06 23:00 ./usr/include/nss/ssl.h
-rw-r--r-- root/root      9126 2016-06-06 23:00 ./usr/include/nss/sslerr.h
-rw-r--r-- root/root      8608 2016-06-06 23:00 ./usr/include/nss/sslproto.h
-rw-r--r-- root/root      5516 2016-06-06 23:00 ./usr/include/nss/sslt.h
-rw-r--r-- root/root      1579 2016-06-06 23:00 ./usr/include/nss/utilmodt.h
-rw-r--r-- root/root      2591 2016-06-06 23:00 ./usr/include/nss/utilpars.h
-rw-r--r-- root/root      2993 2016-06-06 23:00 ./usr/include/nss/utilparst.h
-rw-r--r-- root/root      8662 2016-06-06 23:00 ./usr/include/nss/utilrename.h
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/lib/
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/lib/arm-linux-gnueabihf/
-rw-r--r-- root/root     79866 2016-06-06 23:00 ./usr/lib/arm-linux-gnueabihf/libcrmf.a
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/lib/arm-linux-gnueabihf/pkgconfig/
-rw-r--r-- root/root       278 2016-06-06 23:00 ./usr/lib/arm-linux-gnueabihf/pkgconfig/nss.pc
lrwxrwxrwx root/root         0 2016-06-06 23:00 ./usr/lib/arm-linux-gnueabihf/pkgconfig/xulrunner-nss.pc -> nss.pc
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/share/
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/share/doc/
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/share/doc/libnss3-dev/
-rw-r--r-- root/root      8703 2016-06-03 10:24 ./usr/share/doc/libnss3-dev/changelog.Debian.gz
-rw-r--r-- root/root     39470 2015-08-16 18:28 ./usr/share/doc/libnss3-dev/copyright
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/share/lintian/
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/share/lintian/overrides/
-rw-r--r-- root/root       166 2015-08-16 18:28 ./usr/share/lintian/overrides/libnss3-dev


libnss3-dbg_3.14.5-1+deb7u7_armhf.deb
-------------------------------------

 new debian package, version 2.0.
 size 3452192 bytes: control archive=1715 bytes.
     950 bytes,    20 lines      control              
    2132 bytes,    21 lines      md5sums              
 Package: libnss3-dbg
 Source: nss
 Version: 2:3.14.5-1+deb7u7
 Architecture: armhf
 Maintainer: Maintainers of Mozilla-related packages <pkg-mozilla-maintainers@lists.alioth.debian.org>
 Installed-Size: 4253
 Depends: libnss3 (= 2:3.14.5-1+deb7u7) | libnss3-tools (= 2:3.14.5-1+deb7u7)
 Conflicts: libnss3 (>> 2:3.14.5-1+deb7u7), libnss3 (<< 2:3.14.5-1+deb7u7), libnss3-tools (>> 2:3.14.5-1+deb7u7), libnss3-tools (<< 2:3.14.5-1+deb7u7)
 Provides: libnss3-1d-dbg
 Section: debug
 Priority: extra
 Multi-Arch: same
 Homepage: http://www.mozilla.org/projects/security/pki/nss/
 Description: Debugging symbols for the Network Security Service libraries
  This is a set of libraries designed to support cross-platform development
  of security-enabled client and server applications. It can support SSLv2
  and  v4, TLS, PKCS #5, #7, #11, #12, S/MIME, X.509 v3 certificates and
  other security standards.
  .
  This package provides the debugging symbols for the library.

drwxr-xr-x root/root         0 2016-06-06 23:00 ./
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/lib/
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/lib/debug/
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/lib/debug/.build-id/
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/lib/debug/.build-id/00/
-rw-r--r-- root/root     84780 2016-06-06 23:00 ./usr/lib/debug/.build-id/00/5f224496b5630534c86d3d993ebdd573dbcc8b.debug
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/lib/debug/.build-id/0a/
-rw-r--r-- root/root    103494 2016-06-06 23:00 ./usr/lib/debug/.build-id/0a/4089d8d3c8ff236e18e3e13494684cd89d0b37.debug
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/lib/debug/.build-id/2d/
-rw-r--r-- root/root    299487 2016-06-06 23:00 ./usr/lib/debug/.build-id/2d/2017a63caad2a8ac3490783141e66ec5c2994a.debug
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/lib/debug/.build-id/32/
-rw-r--r-- root/root    172207 2016-06-06 23:00 ./usr/lib/debug/.build-id/32/4b5ee1747c8ebc3e5da86dd94e2a68166b5f93.debug
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/lib/debug/.build-id/4a/
-rw-r--r-- root/root    199507 2016-06-06 23:00 ./usr/lib/debug/.build-id/4a/757e83a804c3fabd49f420d542ede4d2077027.debug
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/lib/debug/.build-id/5d/
-rw-r--r-- root/root    211433 2016-06-06 23:00 ./usr/lib/debug/.build-id/5d/639d737108f5742cb0dbf521906db65c6409c4.debug
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/lib/debug/.build-id/64/
-rw-r--r-- root/root    104707 2016-06-06 23:00 ./usr/lib/debug/.build-id/64/305fed1bc46ca63dd9bceb937f74788355fd51.debug
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/lib/debug/.build-id/96/
-rw-r--r-- root/root     21947 2016-06-06 23:00 ./usr/lib/debug/.build-id/96/e90e41250c19328c8db8c3bba132e5aeb10deb.debug
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/lib/debug/.build-id/9d/
-rw-r--r-- root/root     94280 2016-06-06 23:00 ./usr/lib/debug/.build-id/9d/c307943ee28dfb1e1b32906d8995661db0925c.debug
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/lib/debug/.build-id/c3/
-rw-r--r-- root/root    294135 2016-06-06 23:00 ./usr/lib/debug/.build-id/c3/b686e95d650dda3da8562636cf15cec97682bb.debug
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/lib/debug/.build-id/cc/
-rw-r--r-- root/root    126354 2016-06-06 23:00 ./usr/lib/debug/.build-id/cc/a3672195f1285906a873285f723646151fc382.debug
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/lib/debug/.build-id/ce/
-rw-r--r-- root/root    143150 2016-06-06 23:00 ./usr/lib/debug/.build-id/ce/b9fed31bbcab8207f2c287b5d67fbe82e2a902.debug
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/lib/debug/.build-id/d3/
-rw-r--r-- root/root    143568 2016-06-06 23:00 ./usr/lib/debug/.build-id/d3/590723b8e1b9aa50efa86f47457c4f3f0561c1.debug
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/lib/debug/.build-id/d9/
-rw-r--r-- root/root    390265 2016-06-06 23:00 ./usr/lib/debug/.build-id/d9/1b97548fc70b97378f57e4ce8f4f636feedcc4.debug
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/lib/debug/.build-id/e2/
-rw-r--r-- root/root    173987 2016-06-06 23:00 ./usr/lib/debug/.build-id/e2/273ec4268298c842f23f4b99adb66beaa67750.debug
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/lib/debug/.build-id/e5/
-rw-r--r-- root/root   1455802 2016-06-06 23:00 ./usr/lib/debug/.build-id/e5/1562a8539ebf430a4386d5bb66cfbd9299cfa7.debug
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/lib/debug/.build-id/e6/
-rw-r--r-- root/root     23575 2016-06-06 23:00 ./usr/lib/debug/.build-id/e6/3735008f7d39ceea8f9b46f1452b900eaa8643.debug
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/lib/debug/.build-id/fc/
-rw-r--r-- root/root    261338 2016-06-06 23:00 ./usr/lib/debug/.build-id/fc/e2e7c8e153f646034a4b99aa62eb183f9f1984.debug
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/share/
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/share/doc/
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/share/doc/libnss3-dbg/
-rw-r--r-- root/root      8703 2016-06-03 10:24 ./usr/share/doc/libnss3-dbg/changelog.Debian.gz
-rw-r--r-- root/root     39470 2015-08-16 18:28 ./usr/share/doc/libnss3-dbg/copyright
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/share/lintian/
drwxr-xr-x root/root         0 2016-06-06 23:00 ./usr/share/lintian/overrides/
-rw-r--r-- root/root       166 2015-08-16 18:28 ./usr/share/lintian/overrides/libnss3-dbg


+------------------------------------------------------------------------------+
| Post Build                                                                   |
+------------------------------------------------------------------------------+


+------------------------------------------------------------------------------+
| Cleanup                                                                      |
+------------------------------------------------------------------------------+

Purging /<<BUILDDIR>>
Not cleaning session: cloned chroot in use

+------------------------------------------------------------------------------+
| Summary                                                                      |
+------------------------------------------------------------------------------+

Build Architecture: armhf
Build-Space: 185048
Build-Time: 2361
Distribution: wheezy-staging
Host Architecture: armhf
Install-Time: 183
Job: nss_2:3.14.5-1+deb7u7
Machine Architecture: armhf
Package: nss
Package-Time: 2594
Source-Version: 2:3.14.5-1+deb7u7
Space: 185048
Status: successful
Version: 2:3.14.5-1+deb7u7
--------------------------------------------------------------------------------
Finished at 20160606-2301
Build needed 00:43:14, 185048k disc space